Publisher
Springer Nature Switzerland
Reference63 articles.
1. Snort: Network intrusion detection and prevention. https://www.snort.org. Accessed 28 Sept 2022
2. The Zeek network security monitor. https://zeek.org. Accessed 28 Sept 2022
3. J.R. Abrial, The B-Book: Assigning Programs to Meanings (Cambridge University Press, 2005)
4. U. Adhikari, T.H. Morris, S. Pan, Applying non-nested generalized exemplars classification for cyber-power event and intrusion detection. IEEE Trans. Smart Grid 9(5), 3928–3941 (2018). https://doi.org/10.1109/TSG.2016.2642787
5. A. Ahmed, A. Lisitsa, C. Dixon, A misuse-based network intrusion detection system using temporal logic and stream processing, in 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, 6–8 Sept 2011, ed. by P. Samarati, S. Foresti, J. Hu, G. Livraga (IEEE, 2011), pp. 1–8. https://doi.org/10.1109/ICNSS.2011.6059953