Showing 7 open source projects for "intrusion c#"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Untangle
    Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com
    Downloads: 17 This Week
    Last Update:
    See Project
  • 3

    smartsbc

    Smart Session Border Controller

    ...Design SmartSBC (c) is a multithreaded service which contains serverla embeded and pluguble modules: a) Realtime Log file mining module. This subservice module is responsible to analize certain patterns reported in log files in order to detect possible intrusion threats. You can configure your own pattern in your own lof file in order to trigger alerts or take actions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    XML-CF-lib

    XML-CF-lib

    TeleScope-CF XML Content Filtering Library

    Current TeleScope-CF Java library implementation employs XML parsing and specific pattern-matching that provides standard logical operator constructs to construct the query over the values of XML elements and attributes applied to the XML message on the fly as it is provided in the form of a String object. The code base has been adopted from TeleScope CQ XML stream broker code base written in C. C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 5
    telescope-cf-library

    telescope-cf-library

    TeleScope-CF XML Content Filtering Library

    Current TeleScope-CF Java library implementation employs XML parsing and specific pattern-matching that provides standard logical operator constructs to construct the query over the values of XML elements and attributes applied to the XML message on the fly as it is provided in the form of a String object. The code base has been adopted from TeleScope CQ XML stream broker code base written in C. C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB