Author:
Bai Quan,Xiong Gang,Zhao Yong
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Cohen, F.: Managing network security—Part 14: 50 ways to defeat your intrusion detection system. Netw. Secur. 1997(12), 11–14 (1997)
2. Vidal, J.M., Castro, J.D.M., Orozco, A.L.S., et al.: Evolutions of evasion techniques against network intrusion detection systems. In: ICIT 2013 The 6th International conference on Information Technology (2013)
3. Khan, H., Khayam, S.A., Rajarajan, M., et al.: Wirespeed, privacy-preserving P2P traffic detection on commodity switches. (under submission, 2013)
4. Puangpronpitag, S., Chuachan, T., Pawara, P.: Classifying peer-to-peer traffic using protocol hierarchy. In: 2014 International Conference on Computer and Information Sciences (ICCOINS), pp. 1–6. IEEE (2014)
5. Hernacki, B., Bennett, J., Hoagland, J.: An overview of network evasion methods. Inf. Secur. Tech. Rep. 10(3), 140–149 (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献