Call for papers

SecurityFocus ( ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to:

Infocus: IDS (Page 8 of 10)   < Prev  3 4 5 6 7 8 9 10  Next >
Analysis of the T0rn Rootkit
By: Toby Miller 2000-11-29

Social Engineering
By: Toby Miller 2000-06-19

Hacker Tools and their Signatures, Part Three: Rootkits
By: Toby Miller 2001-08-14

Intrusion Detection: Filling in the Gaps
By: Robert MacBride 2000-04-06

Resynchronizing NIDS Systems
By: Eric Hacker 2000-09-22

Intrusion Detection Level Analysis of Nmap and Queso
By: Toby Miller 2000-08-30

Passive Fingerprinting
By: Lance Spitzner 2000-05-03

Studying Normal Traffic, Part Three: TCP Headers

By: Karen Kent Frederick 2001-05-14

Studying Normal Traffic, Part Two: Studying FTP Traffic

By: Karen Kent Frederick 2001-02-21

Studying Normal Network Traffic, Part One

By: Karen Kent Frederick 2001-01-29

IDS (Page 8 of 10)   < Prev  3 4 5 6 7 8 9 10  Next >


Privacy Statement
Copyright 2010, SecurityFocus