Subject
Law,Hardware and Architecture,Software
Reference26 articles.
1. A user-oriented ontology-based approach for network intrusion detection;Hung;Comput. Stand. Interfaces,2008
2. Internet forensics on the basis of evidence gathering with peep attacks;Wang;Comput. Stand. Interfaces,2007
3. “Application layer packet classifier for Linux,” http://l7-filter.sourceforge.net/.
4. “Snort,” http://www.snort.org/.
5. “The bro network security monitor,” http://bro-ids.org/.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献