Author:
Ahmed Ghilman,Khan Muhammad Naeem Ahmed,Bashir Muhammad Shamraiz
Subject
Law,General Computer Science
Reference12 articles.
1. Padmashani, R; Sathyadevan, S; Dath, D. ‘BSnort IPS’. In proceedings of 12th International Conference on Intelligent Systems Design and Applications (ISDA), Kochi, India, 27-29 Dec 2012, pp.46-51.
2. ‘Incidence Handling and Response System’;Kalbande;International Journal of Computer Science and Information security (IDCSIS),2009
3. Salehi, H; Shirazi, H; Moghadam, R. ‘Increasing overall network security by integrating signature-based NIDS with packet filtering firewall’. In proceedings of International Joint Conference on Artificial Intelligence (JCAI), Hainan Island, 25-26 Apr 2009, pp.357-362.
4. Alshubhi, K; Aib, I; Francois, J; Boutaba, R. ‘Policy-Based Configuration Management Application to Intrusion Detection and Prevention’. In proceedings of International Conference on Communication (ICC), Dresden, 14-18 Jun 2009, pp.1-6.
5. Tang, H; Xu, C; Luo, X; Ouyang, J. ‘Traceback-based Bloomfilter IPS in defending SYN flooding attack’. In proceedings of 5th International Wireless Communications, Networking and Mobile Computing (WiCom), Beijing, 24-26 Sept 2009, pp.1-6.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. JARVIS: An Intelligent Network Intrusion Detection and Prevention System;2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC);2022-01-10
2. Snort ids system visualization interface for alert analysis;Serbian Journal of Electrical Engineering;2022
3. A Risk Based Analysis on Linux Hosted E-Commerce Sites in Bangladesh;Cyber Security and Computer Science;2020