Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,254,423 papers from all fields of science
Search
Sign In
Create Free Account
Open Source Tripwire
Known as:
Tripwire (disambiguation)
, Tripwire (software)
Open Source Tripwire is a free software security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Advanced Intrusion Detection Environment
Cryptographic hash function
File integrity monitoring
Gene Spafford
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Tripping the Flow past a Circular Cylinder: Use of Multiple Large-Scale Spanwise Protrusions
A. Joshi
2016
Corpus ID: 114317200
An experimental study is carried out to investigate if the collective influence of multiple spanwise tripwires fitted on a…
Expand
2010
2010
Simulating windows-based cyber attacks using live virtual machine introspection
D. A. Dodge
,
B. Mullins
,
Gilbert L. Peterson
,
James S. Okolica
Summer Simulation Multiconference
2010
Corpus ID: 15882098
Static memory analysis has been proven a valuable technique for digital forensics. However, the memory capture technique halts…
Expand
2005
2005
Process query systems for network security monitoring
V. Berk
,
N. Fox
SPIE Defense + Commercial Sensing
2005
Corpus ID: 63048311
In this paper we present the architecture of our network security monitoring infrastructure based on a Process Query System (PQS…
Expand
2005
2005
Monitoring Fish Wheel Catch Using Event-Triggered Video Technology
David W. Daum
2005
Corpus ID: 56332137
Abstract In large, turbid rivers, fish wheels are often used as a live-capture technique for monitoring migratory fish runs…
Expand
2005
2005
Sensing Technologies for Tripwire Detection
L. Liao
,
L. Carter
2005
Corpus ID: 164214630
Tripwire-operated landmines form a major hazard to deminers, especially where the wire is concealed in vegetation which the…
Expand
2004
2004
Formal Reasoning About Intrusion Detection Systems
Tao Song
,
C. Ko
,
J. Alves-Foss
,
Cui Zhang
,
K. Levitt
International Symposium on Recent Advances in…
2004
Corpus ID: 17322967
Intrusion detection is an appealing approach to improving the security of systems. The goal of intrusion detection is to detect…
Expand
2003
2003
A Distributed Algorithm for Waking-up in Heterogeneous Sensor Networks
Akis Spyropoulos
,
C. Raghavendra
,
V. Prasanna
International Symposium on Information Processing…
2003
Corpus ID: 15348363
In this paper we present a distributed, application-morphable, algorithm for waking up appropriate sensor nodes in a…
Expand
2001
2001
Eyesafe laser-illuminated tripwire (ELIT) detector
T. H. Allik
,
D. Dawkins
,
+6 authors
K. Sherbondy
SPIE Defense + Commercial Sensing
2001
Corpus ID: 121725831
The technical issues of a standoff electro-optic tripwire detector are discussed. Significant advances in short-wave infrared…
Expand
2001
2001
Configuration: Tripwire in the enterprise: integrating Tripwire into big brother
Elena Khan
2001
Corpus ID: 61585450
1999
1999
GuardHouse: Locking the Stable door ahead of the Trojan Horse
Steve Beattie
,
A. Black
,
Crispin Cowan
,
C. Pu
,
L. P. Yang
1999
Corpus ID: 6144627
Once attackers have penetrated a system, they will usually take advantage of their position by extending their reach to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE