Author:
Rimmer Vera,Nadeem Azqa,Verwer Sicco,Preuveneers Davy,Joosen Wouter
Publisher
Springer International Publishing
Reference106 articles.
1. Suricata IDS (2010). https://suricata-ids.org/. Accessed 1 June 2020
2. Zeek IDS (2018). https://zeek.org/. Accessed 12 July 2020
3. Ahmad, S., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134–147 (2017)
4. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
5. Albin, E., Rowe, N.C.: A realistic experimental comparison of the Suricata and Snort intrusion-detection systems. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 122–127. IEEE (2012)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献