Author:
Andreolini Mauro,Colajanni Michele,Marchetti Mirco
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference37 articles.
1. E. Albin, N. Rowe, A realistic experimental comparison of the Suricata and Snort intrusion-detection systems, in: Enokido, T. (Ed.), Proc. 26th Int. Conf. Advanced Information Networking and Applications, WAINA’12. IEEE, Los Alamitos, CA, March 2012, pp. 122–127.
2. A probabilistic diffusion scheme for anomaly detection on smartphones;Alpcan,2010
3. Dynamic load balancing for network intrusion detection systems based on distributed architectures;Andreolini,2007
4. Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices;Becher,2011
5. A survey of intrusion detection systems in wireless sensor networks;Butun;Commun. Surv. Tutorials,2014
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献