Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,101,585 papers from all fields of science
Search
Sign In
Create Free Account
OSSEC
OSSEC is a free, open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Cisco FWSM
Cisco IOS
Cisco PIX
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Interested in learning more about cyber security training ?
Christoph Guenther
2018
Corpus ID: 53977833
This paper explains the basic principles of quantum cryptography and how these principles apply to quantum key distribution. One…
Expand
2018
2018
A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE
Ragav Venkatesan
,
D. Devi
,
R. Keerthana
,
A. Kumar
International Conference on Software and Computer…
2018
Corpus ID: 53764674
Across the globe, all the companies are marching towards data security and data protection. Prevention measures are taken to…
Expand
2018
2018
Cyber Anomaly Detection Using Graph-node Role-dynamics
A. Palladino
,
C. Thissen
arXiv.org
2018
Corpus ID: 54457568
Intrusion detection systems (IDSs) generate valuable knowledge about network security, but an abundance of false alarms and a…
Expand
2016
2016
Modelling the Structure of Reusable Solutions for Architecture-Based Quality Evaluation
A. Busch
,
Yves Schneider
,
A. Koziolek
,
Kiana Rostami
,
J. Kienzle
IEEE International Conference on Cloud Computing…
2016
Corpus ID: 14305046
When designing cloud applications many decisions must be made like the selection of the right set of software components. Often…
Expand
2016
2016
IMPROVING ANOMALY DETECTION PROCESS IN COMPUTER NETWORKS HAVING EXISTING IDS USING ADDITIONAL BEHAVIORAL LAYER, OPTIMIZED BACK PROPAGATION NEURAL NETWORK AND MOBILE AGENTS (MULTI CLASS ATTACK…
Bhavin Shah
2016
Corpus ID: 62903588
2015
2015
Intrusion Detection System Software Comparison
2015
Corpus ID: 16360864
Select Up to 5 Products to Compare. Compare The Samhain host-based intrusion detection system (HIDS) provides file integrity…
Expand
2014
2014
An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC)
Saeed M. Alqahtani
,
Maqbool Al Balushi
,
R. John
International Conference on Computational Science…
2014
Corpus ID: 15883935
Cloud computing is a fast growing IT model for the exchange and delivery of different services through the Internet. However…
Expand
Review
2014
Review
2014
An Innovative Method to Improve Security inCloud: Using LDAP and OSSEC
S. Nema
,
S. Raghuwanshi
2014
Corpus ID: 55536135
Cloud computing refers to the delivery of computing resources over the Internet. Cloud computing is a diverse technological…
Expand
2010
2010
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance
Amy Fedyk
,
M. Atighetchi
,
P. Pal
International Conference on Network and Service…
2010
Corpus ID: 14889120
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel…
Expand
2008
2008
Working with Rules
Andrew W. Hay
,
D. Cid
,
Rory Bary
,
Stephen Northcutt
2008
Corpus ID: 60461406
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE