Ubiquitous Networking
暂无分享,去创建一个
[1] Won Hyung Park,et al. Performance Comparison and Detection Analysis in Snort and Suricata Environment , 2017, Wirel. Pers. Commun..
[2] Ehab Al-Shaer,et al. Alert prioritization in Intrusion Detection Systems , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[3] Lucas M. Venter,et al. A comparison of Intrusion Detection systems , 2001, Comput. Secur..
[4] Khaled Salah,et al. Performance evaluation comparison of Snort NIDS under Linux and Windows Server , 2010, J. Netw. Comput. Appl..
[5] Robert Ivor John,et al. A comparative study of different fuzzy classifiers for Cloud Intrusion Detection Systems' alerts , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
[6] Chris Clifton,et al. Developing custom intrusion detection filters using data mining , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[7] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[8] Maxwell G. Dondo,et al. A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach , 2008, SEC.
[9] Jeanna Neefe Matthews,et al. Quantitative analysis of intrusion detection systems: Snort and Suricata , 2013, Defense, Security, and Sensing.
[10] Barry Irwin,et al. Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope , 2007, VizSEC.
[11] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[12] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[13] Nor Badrul Anuar,et al. A risk index model for security incident prioritisation , 2011 .
[14] Eugene Albin. A Comparative Analysis of the Snort and Suricata Intrusion-Detection Systems , 2011 .
[15] Eric Eide,et al. Scientific Infrastructure for Advancing Cloud Architectures and Applications , 2014 .
[16] Y. V. Ramana Reddy,et al. TRINETR: an intrusion detection alert management systems , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[17] Neil C. Rowe,et al. A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[18] Song Guo,et al. Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.
[19] Keith Phalp,et al. Exploring discrepancies in findings obtained with the KDD Cup '99 data set , 2011, Intell. Data Anal..
[20] Abdellah Ezzati,et al. A novel architecture for task scheduling based on Dynamic Queues and Particle Swarm Optimization in cloud computing , 2016, 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).
[21] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[22] Rajkumar Buyya,et al. A Negotiation Mechanism for Advance Resource Reservations Using the Alternate Offers Protocol , 2008, 2008 16th Interntional Workshop on Quality of Service.
[23] Youness Idrissi Khamlichi,et al. Handling alerts for intrusion detection system using stateful pattern matching , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).