IMIST


Votre recherche a retourné 3 résultats.

Network security policies and procedures / par Frye, Douglas W. Publication : New York : Springer, 2007 . 240 p. : 25 cm. Date : 2007 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Preserving privacy in On-Line Analytical Processing (OLAP) / par Wang, Lingyu. Publication : New York : Springer, 2007 . xi, 180 p. : 25 cm. Date : 2007 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Understanding intrusion detection through visualization / par Axelsson, Stefan. Publication : [S.l.] : Springer, 2005 . 145 p. ; , With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents researchïɪħon why false alarms are, and will remain a problem; then appliesïɪħresults from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. Thisïɪħvolume presents four different visualization approaches, mainly applied to data from web server access logs. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Vous ne trouvez pas ce que vous cherchez ?
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha