Author:
Bul'ajoul Waleed,James Anne,Pannu Mandeep
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Theoretical Computer Science
Reference35 articles.
1. A survey of emerging threats in cybersecurity;Jang-Jaccard;J. Comput. Syst. Sci.,2014
2. Intrusion detection systems and intrusion prevention systems;Fuchsberger;Inf. Secur. Tech. Rep.,2005
3. A realistic experimental comparison of the Suricata and Snort intrusion-detection systems;Albin,2012
4. A parallel technique for improving the performance of signature-based network intrusion detection system;Shiri,2011
Cited by
62 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献