Author:
Adhao Rahul B.,Pachghare Vinod K.
Reference40 articles.
1. False alarm minimization techniques in signature-based intrusion detection systems: A survey
2. UdayBanerjee Wireless Security: Considerations Intrusion Detection System Tools and More SANS Conference Virginia Beach 2004.
3. NIDS Designed Using Two Stages Monitoring;Adhao R. B.;International Journal of Computer Science and Information Technologies,2014
4. Cisco Introduction to Cisco IOS NetFlow ‐ A Technical Overview https://www.cisco.com/c/en/us/products/collateral/ios‐nx‐os‐software/ios‐net‐flow/prod_white_paper0900aecd80406232.html 2012.