Proactive Security Mechanism and Design for Firewall
暂无分享,去创建一个
Xiaofeng Liao | Aqeel-ur Rehman | Saleem-Ullah Lar | Ma Qinglu | X. Liao | A. Rehman | Mao Qinglu | Saleem-Ullah Lar
[1] Jianyi Lin,et al. Computer crime and security survey , 2002 .
[2] Evangelos P. Markatos,et al. Design and Implementation of a High-Performance Network Intrusion Prevention System , 2005, SEC.
[3] Wide-area Hardware-accelerated Intrusion Prevention Systems ( WHIPS ) , 2004 .
[4] Gildas A. Deograt-Lumy,et al. Intrusion Prevention Systems , 2011, Encyclopedia of Information Assurance.
[5] C. Lucas,et al. Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..
[6] John W. Lockwood,et al. Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.
[7] Jim Mellander,et al. Intrusion Detection & Prevention , 2003 .
[8] John W. Lockwood,et al. Architecture for a hardware-based, TCP/IP content-processing system , 2004, IEEE Micro.
[9] Richard Bassett,et al. Intrusion prevention systems: How do they prevent intrusion? , 2006 .
[10] Haoyu Song,et al. Efficient packet classification for network intrusion detection using FPGA , 2005, FPGA '05.