Showing 11 - 20 of 488 results for the Type - White Paper
In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.
In this paper, Ron McLeod describes a network traffic capture and analysis used to investigate network performance issues of a small private network.
In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.
In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.
In this paper, the authors describe NVisionIP, a NetFlow visualization tool.
In this paper, the authors describe a network flow analyzer capable of attribution and aggregation of different flows to identify suspicious behaviors.
In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.
In this paper, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.
In this paper, the authors describe the project that led to the creation of the U.S. Postal Service's CISO Academy.
This white paper describes a set of skills that CSIRT staff members should have to provide basic incident-handling services.