Author:
Williams Joel,King Job,Smith Byron,Pouriyeh Seyedamin,Shahriar Hossain,Li Lei
Publisher
Springer International Publishing
Reference43 articles.
1. D.J. Brown, B. Suckow, T. Wang, A survey of intrusion detection systems. Department of Computer Science, University of California, San Diego (2002)
2. J. Chang, K.K. Venkatasubramanian, A.G. West, I. Lee, Analyzing and defending against web-based malware. ACM Comput. Surv. 45(4), 1–35 (2013)
3. M.E. Cueva Hurtado, G. Gutierrez, C.R. Narvaéz Guillen, F.J. Álvarez Pineda, M.D.C. Ruilova Sanchez, Systematic literature review: open source tools for intrusion detection in wired and wireless networks, in 2019 International Conference on Information Systems and Computer Science (INCISCOS) (2019), pp. 208–215
4. A. Das, S. Baki, A.E. Aassal, R. Verma, A. Dunbar, SOK: a comprehensive reexamination of phishing research from the security perspective. IEEE Commun. Surv. Tutor. 22(1), 671–708 (2019)
5. S. Edwards, Network Intrusion Detection Systems: Important IDS Network Security Vulnerabilities (2002)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fast-Flux Service Networks: Architecture, Characteristics, and Detection Mechanisms;Security Informatics and Law Enforcement;2023-07-03
2. Combating the Phishing Attacks;Advanced Practical Approaches to Web Mining Techniques and Application;2022-03-18