Affiliation:
1. Petabi, Inc.
2. Department of Aerospace Information Engineering, Konkuk University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference29 articles.
1. [1] “Secunia vulnerability review 2014: Key figures and facts from a global IT-security perspective,” Feb. 2014.
2. [2] The Snort Project, SNORT User Manual 2.9.7, Oct. 2014. https://www.snort.org/documents/snort-users-manual
3. [3] R. Smith, C. Estan, and S. Jha, “Backtracking algorithmic complexity attacks against a NIDS,” Proc. 22nd Computer Security Applications Conference, pp.89-98, Dec. 2006.
4. [4] V.C. Valgenti, H. Sun, and M.S. Kim, “Protecting run-time filters for network intrusion detection systems,” Advanced Information Networking and Applications (AINA), IEEE 28th International Conference on, pp.116-122, May 2014.
5. [5] R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das, “The 1999 DARPA off-line intrusion detection evaluation,” Computer Networks, vol.34, no.4, pp.579-595, Oct. 2000.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献