Author:
Dedousis Panagiotis,Stergiopoulos George,Gritzalis Dimitris
Publisher
Springer International Publishing
Reference68 articles.
1. Marpaung, J., Sain, M., Lee, H.-J.: Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp. 744–749 (2012)
2. Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1–22 (2019). https://doi.org/10.1186/s42400-019-0038-7
3. Zanero, S.: Flaws and frauds in the evaluation of IDS/IPS technologies. In: Proceedings of FIRST. Citeseer (2007)
4. Stergiopoulos, G., Lygerou, E., Tsalis, N., Tomaras, D., Gritzalis, D.: Avoiding network and host detection using packet bit-masking: In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, pp. 52–63. SCITEPRESS - Science and Technology Publications, Lieusaint, Paris, France (2020)
5. Yetiser, T.: Mutation Engine Report. VIRUS-L Digest. 5 (1992)