Author:
Xiong Wei,Xiong Naixue,Yang Laurence T.,Park Jong Hyuk,Hu Hanping,Wang Qian
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference43 articles.
1. Roesch M (1999) Snort–lightweight intrusion detection for networks. In: Proc of LISA ’99: 13th systems administration conference, pp 229–238
2. Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23):2435–2463
3. Beghdad R (2004) Modelling and solving the intrusion detection problem in computer networks. Comput Secur 23(8):687–696
4. Horng S, Fan P, Chou Y et al (2008) A feasible intrusion detector for recognizing IIS attacks based on neural networks. Comput Secur 27(3-4):84–100
5. Lippmann R, Fried D, Graf I et al (2000) Evaluating intrusion detection systems: the 1998 DARPA off-lineintrusion detection evaluation. In: Proc of the DARPA information survivability conference and exposition. IEEE Computer Society Press, Los Alamitos,
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献