• Network Management
Displaying 1-10 of 834 documents Export Results

CIPHER 5-6-2003 CIPHER Counterintelligence Penetration Hazard Evaluation and Recognition A great deal of very sensitive information resides on a very wide collection of computer networks. This information ranges from personal credit card information to nuclear weapons design. Typically this information is heavily protected, and likewise, highly sought after by various illicit groups. These gro…

Method and Device for In-situ Trainable Intrusion Detection System Disclosure Number 201202902 Technology Summary Almost every major computer network is defended by signature-based Intrusion Detection Systems (IDSs) that are designed to alert whenever a pattern that indicates a known exploit is detected. We have developed an advanced, non-signature-based,…

Final Report for the Intrusion Detection for Asynchronous Transfer Mode (ATM) Networks Laboratory Directed Research and Development Project S Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United Stat…

The portals 3.3 message passing interface document revision 2.1. SANDIA REPORT SAND2006-0420 Unlimited Release Printed April 2006 Supersedes SAND99-2959 Dated December 1999 The Portals 3.3 Message Passing Interface Document Revision 2.1 Rolf Riesen, Ron Brightwell, and Kevin Pedretti, Arthur B. Maccabe, and Trammell Hudson Trammell Hudson, Rotomotion Prepared by Sandia Nat…

Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.3 P I 1 : PNL-10689 Ver I .3 uc-620 FEDERAL EMERGENCY MANAGEMENT INFORMATION SYSTEM (FEMIS) BILL OF MATERIALS (BOM) for FEMIS Version 1.3 Michael J. Burford Lawrence H. Gerhardstein Ranata L. Johnson Robert M. Loveall Tonya J. Martin W. David Millard LaMar R. Stoops C…

Method for detecting sophisticated cyber attacks Description BACKGROUND OF THE INVENTION 1. Field of Invention The invention relates to methods for detecting unwanted intrusions into computer networks. More particularly, data pertaining to targeted internet protocol addresses in a network are compared to data from the IP addresses of possible intruders using a vector space model, c…

: Patents
: UT, Battelle LLC
: model, Design, Internet Protocol...
There is 1 document very similar to this result - View

Method for detecting sophisticated cyber attacks Description BACKGROUND OF THE INVENTION 1. Field of Invention The invention relates to methods for detecting unwanted intrusions into computer networks. More particularly, data pertaining to targeted internet protocol addresses in a network are compared to data from the IP addresses of possible intruders using a vector space model,…

: Patents
: UT, Battelle LLC
: model, Design, Internet Protocol...

Methods for developing and validating survivability distributions REPORT DOCUMENTATION PAGE Fo,,._o_.,ov._OMB No. 0704.014111 Public reporting burden for this collection of Information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gethedng and maintaining the data needed, and completing and reviewing the collection o…

Ultrasonic speech translator and communications system Description BACKGROUND OF THE INVENTION The present invention relates generally to the art of wireless communication and, more particularly, to a system which utilizes ultrasonic acoustical pressure waves to transmit and receive audio signals across a medium such as gas, liquid, or solid material. The invention further relates to t…

Lawrence Livermore National Laboratory Integrated Computing and Communications Department FY06 I/O Integration Blueprint Reviewed and Released v1.7 UCRL-TR-220607 April 1, 2006 K.Cupps BG/L K.Fitzgerald Lustre deployment, Interconnects, IO Testbed M.Gary & J.Shoopman Archival Storage P.Hamilton Purple B.Loewe Scalable IO J.Slavec Facility Networks D.Smith & D.Fox Network Attached St…

Cybersecurity through Real-Time Distributed Control Systems ORNL/TM-2010/30 Cybersecurity through Real-Time Distributed Control Systems February 2010 Prepared by R. A. Kisner W. W. Manges L. P. MacIntyre J. J. Nutaro J. K. Munro P. D. Ewing M. Howlader P. T. Kuruganti R. M. Wallace M. M. Olama …

Results: 12345678910... Next
Search Home Help About InSpire