Showing 11 - 20 of 495 results for the Type - White Paper
In this paper, the authors describe NVisionIP, a NetFlow visualization tool.
In this paper, the authors describe a network flow analyzer capable of attribution and aggregation of different flows to identify suspicious behaviors.
In this paper, the authors show how IPFIX and PSAMP can be used to support network security.
In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.
In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.
In this paper, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.
The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.
This white paper describes a set of skills that CSIRT staff members should have to provide basic incident-handling services.
This white paper discusses the issues and decisions organizations should address when planning, implementing, and building a CSIRT.
In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.