intrusion signature

Related Overviews


'intrusion signature' can also refer to...


More Like This

Show all results sharing this subject:

  • Computing


Show Summary Details

Quick Reference

Data that can be used to anticipate an intrusion into a networked system. For example, most users of a system have a regular profile of when they log on and log off.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.