Author:
Alsharabi Naif,Alqunun Maha,Murshed Belal Abdullah Hezam
Publisher
Engineering and Technology Publishing
Subject
Artificial Intelligence,Computer Networks and Communications,Computer Science Applications,Information Systems,Software
Reference24 articles.
1. [1] R S Aarthee and E. Devarasan, "A logistic model for the population of virus growth in local area network," International Journal of Pure and Applied Mathematics, vol. 115, no. 9, pp. 401-408, August 2017
2. [2] N. Khamphakdee, N. Benjamas, and S. Saiyod, "Improving intrusion detection system based on snort rules for network probe attack detection," in Proc. 2014 2nd International Conference on Information and Communication Technology (ICoICT), Bandung, Indonesia, 2014, pp. 69-74, doi: 10.1109/ICoICT.2014.6914042.
3. [3] M. V. Pawar and J. Anuradha, "Network security and types of attacks in network," Procedia Computer Science, vol. 48, 2015, pp. 503-506, doi: 10.1016/j.procs.2015.04.126
4. [4] S. Gopal, G. Sachin, and A. Ratish, "Intrusion detection using network monitoring tools," SSRN, 2014, doi: 10.2139/ssrn.2426105.
5. [5] M. A. Qadeer, A. Iqbal, M. Zahid, and M. R. Siddiqui, "Network traffic analysis and intrusion detection using packet sniffer," in Proc. 2010 2nd International Conference on Communication Software and Networks, 2010, pp. 313-317, doi: 10.1109/ICCSN.2010.104.