Author:
Xiang Yu,Tan Runnan,Zhao Silin,Tan Qingfeng
Publisher
Springer Nature Singapore
Reference25 articles.
1. I2p anonymous network. https://geti2p.net/. Last accessed on 25 Oct 2023
2. Phisher steals $500,000 due to weak password (2023). https://www.itro.com.au/phisher-steals-500000-weak-password. Last accessed on 25 Oct 2023
3. Abdulganiyu, O.H., Ait Tchakoucht, T., Saheed, Y.K.: A systematic literature review for network intrusion detection system (ids). Int. J. Inf. Secur. 22(5), 1125–1162 (2023)
4. Aljanabi, M., Ismail, M.A., Ali, A.H.: Intrusion detection systems, issues, challenges, and needs. Int. J. Comput. Intell. Syst. 14(1), 560–571 (2021)
5. Bellovin, S.M., Cheswick, W.R.: Network firewalls. IEEE Commun. Mag. 32(9), 50–57 (1994)