Author:
Badr Youakim,Hariri Salim,AL-Nashif Youssif,Blasch Erik
Reference87 articles.
1. D. L. Pipkin. Information security: protecting the global enterprise, Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 2000.
2. M. Roesch, “Snort - Lightweight Intrusion Detection for Networks,” 13th Systems Administration Conference - LISA 1999.
3. V. Paxson, “Bro: a system for detecting network intruders in real-time,”Computer Networks (Amsterdam, Netherlands: 1999), 31(23-24):2435-2463, 1999.
4. K. Scarfone and Peter Mell, Guide to Intrusion Detection and Prevention Systems (IDPS). Computer Security Resource Center (National Institute of Standards and Technology) (800-94), 2007, Retrieved 1 January 2010.
5. Y. B. Al-Nashif, A. Kumar, S. Hariri, Y. Luo, F. Szidarovszky, and G. Qu: “Multi-Level Intrusion Detection System (ML-IDS),” ICAC: 131-140, 2008.
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献