Author:
Cheng Sheng-Tzong,Cheng Yu-Ling,Cheung Ka-Chun
Publisher
Springer Nature Switzerland
Reference21 articles.
1. Vollmer, T., et al.: Autonomous rule creation for intrusion detection. Proc. IEEE Symposium on Computational Intelligence in Cyber Security (CICS) 2011, 1–8 (2011)
2. Fallahi, N., et al.: Automated flow-based rule generation for network intrusion detection systems. In: Proc. 2016 24th Iranian Conference on Electrical Engineering (ICEE), pp. 1948–1953 (2016)
3. Sagala, A.: Automatic SNORT IDS rule generation based on honeypot log. In: Proc. 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE), pp. 576–580 (2015)
4. Laryea, E.N.A.: Snort Rule Generation for Malware Detection using the GPT2 Transformer. Université d'Ottawa/University of Ottawa (2022)
5. Sharafaldin, I., et al.: Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization (2018)