Showing 11 - 20 of 491 results for the Type - White Paper
In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.
In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.
In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.
In this paper, the authors describe NVisionIP, a NetFlow visualization tool.
In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.
In this paper, the authors show how IPFIX and PSAMP can be used to support network security.
In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.
This white paper describes a set of skills that CSIRT staff members should have to provide basic incident-handling services.
This white paper discusses the issues and decisions organizations should address when planning, implementing, and building a CSIRT.
This paper examines the current state of cybercrime and explores how organizations and individuals respond to cybercrime threats.