Call for papers

SecurityFocus ( ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to:

Infocus: IDS (Page 10 of 10)   < Prev  5 6 7 8 9 10 
Know Your Enemy: Honeynets
By: Honeynet Project 2001-04-26

Securing an Unpatchable Webserver... HogWash!
By: Jason Larsen 2001-07-31

Building a Security Management Point
By: Flavio Marcelo Amaral 2000-04-14

Realisic Expectations for Intrusion Detection Systems
By: Richard Wiens 2001-03-19

ECN and it's impact on Intrusion Detection
By: Toby Miller 2000-11-03

Multiple Levels of De-synchronization and other concerns with testing an IDS system

By: Jon Gary 2000-08-11

Intrusion Detection, Theory and Practice
By: David Elson 2000-03-27

Hacker Tools and Their Signatures, Part One: bind8x.c

By: Toby Miller 2001-04-11

Analyzing IDS Data
By: Chris Jordan 2000-05-30

Abnormal IP Packets

By: Karen Kent Frederick 2000-10-13

IDS (Page 10 of 10)   < Prev  5 6 7 8 9 10 


Privacy Statement
Copyright 2010, SecurityFocus