Author:
Masarat Saman,Sharifian Saeed,Taheri Hassan
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference70 articles.
1. Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical report
2. Computer Emergency Response Team. http://www.cert.org/
3. Thomason S (2012) Improving network security: next generation firewalls and advanced packet inspection devices. GJCST-E: Network, Web & Security 12(13)
4. Mairh A, Barik D, Verma K, Jena D (2011) Honeypot in network security: a survey. In: Proceedings of the 2011 international conference on communication, computing & security, pp 600–605
5. Bace R, Mell P (2001) NIST special publication on intrusion detection systems. DTIC document
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献