Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: IDS (Page 10 of 10)   < Prev  5 6 7 8 9 10 
Know Your Enemy: Honeynets
By: Honeynet Project 2001-04-26
http://www.securityfocus.com/infocus/1209

Securing an Unpatchable Webserver... HogWash!
By: Jason Larsen 2001-07-31
http://www.securityfocus.com/infocus/1208

Building a Security Management Point
By: Flavio Marcelo Amaral 2000-04-14
http://www.securityfocus.com/infocus/1207

Realisic Expectations for Intrusion Detection Systems
By: Richard Wiens 2001-03-19
http://www.securityfocus.com/infocus/1206

ECN and it's impact on Intrusion Detection
By: Toby Miller 2000-11-03
http://www.securityfocus.com/infocus/1205

Multiple Levels of De-synchronization and other concerns with testing an IDS system

By: Jon Gary 2000-08-11
http://www.securityfocus.com/infocus/1204

Intrusion Detection, Theory and Practice
By: David Elson 2000-03-27
http://www.securityfocus.com/infocus/1203

Hacker Tools and Their Signatures, Part One: bind8x.c

By: Toby Miller 2001-04-11
http://www.securityfocus.com/infocus/1202

Analyzing IDS Data
By: Chris Jordan 2000-05-30
http://www.securityfocus.com/infocus/1201

Abnormal IP Packets

By: Karen Kent Frederick 2000-10-13
http://www.securityfocus.com/infocus/1200

IDS (Page 10 of 10)   < Prev  5 6 7 8 9 10 


 

Privacy Statement
Copyright 2010, SecurityFocus