Author:
Tasneem Aaliya,Kumar Abhishek,Sharma Shabnam
Publisher
Foundation of Computer Science
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detecting Cyber Threats With a Graph-Based NIDPS;Advances in Logistics, Operations, and Management Science;2023-12-29
2. Monitoring, Management, and Analysis of Security Aspects of IaaS Environments;Journal of Telecommunications and Information Technology;2023-12-27
3. Enhancing Security Information and Event Management (SIEM) by Incorporating Machine Learning for Cyber Attack Detection;2023 IEEE 9th International Conference on Computing, Engineering and Design (ICCED);2023-11-07
4. Attacking a packet Analyzer: Caronte case study;2023 IEEE International Conference on Cyber Security and Resilience (CSR);2023-07-31
5. Configuration vulnerability in SNORT for Windows Operating Systems;2022 IEEE International Conference on Cyber Security and Resilience (CSR);2022-07-27