In the world of Intrusion Detection there is a need for a common message format and transport protocol. This allows for the \'easy\' correlation, display, and long term storage of intrusion information. Recent projects have focused on various aspect
Tags
No tags have been added
In a Nutshell, Tunnel over BEEP...
No code available to analyze
Open Hub computes statistics on FOSS projects by examining source code and commit history in source code management systems. This project has no code locations, and so Open Hub cannot perform this analysis
Is this project's source code hosted in a publicly available repository? Do you know the URL? If you do, click the button below and tell us so that Open Hub can generate statistics! It's fast and easy - try it and see!
This Project has No vulnerabilities Reported Against it
Did You Know...
...
55% of companies leverage OSS for production infrastructure
...
data presented on the Open Hub is available through our
API
...
in 2016, 47% of companies did not have formal process in place to track OS code
...
by exploring contributors within projects, you can view details on every commit
they have made to that project
No code available to analyze
Open Hub computes statistics on FOSS projects by examining source code and commit history in source code management systems. This project has no code locations, and so Open Hub cannot perform this analysis
Is this project's source code hosted in a publicly available repository? Do you know the URL? If you do, click the button below and tell us so that Open Hub can generate statistics! It's fast and easy - try it and see!
This site uses cookies to give you the best possible experience.
By using the site, you consent to our use of cookies.
For more information, please see our
Privacy Policy