Intrusion Detection Systems (IDS)—An Overview with a Generalized Framework
暂无分享,去创建一个
[1] Christos Douligeris,et al. Network Security: Current Status and Future Directions , 2007 .
[2] Seppo J. Ovaska. Computationally Intelligent Hybrid Systems: The Fusion of Soft Computing and Hard Computing (IEEE Press Series on Computational Intelligence) , 2004 .
[3] Luiz Eduardo Soares de Oliveira,et al. Toward a reliable anomaly-based intrusion detection in real-world environments , 2017, Comput. Networks.
[4] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[5] Christos Douligeris,et al. Intrusion Detection Versus Intrusion Protection , 2007 .
[6] Farooq Anjum,et al. Intrusion Detection Systems , 2006 .
[7] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[8] L Vokorokos,et al. Host-based intrusion detection system , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.
[9] Ido Dubrawsky. How to Cheat at Securing Your Network , 2007 .
[10] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[11] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[12] Sung-Bae Cho,et al. Intrusion Detection for Computer Security , 2004, Computationally Intelligent Hybrid Systems.
[13] Hervé Debar,et al. The Intrusion Detection Message Exchange Format (IDMEF) , 2007, RFC.
[14] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[15] Tamas Abraham. IDDM: Intrusion Detection Using Data Mining Techniques , 2001 .
[16] George Kurtz,et al. Hacking Exposed: Network Security Secrets & Solutions , 1999 .
[17] Jaishree Singh,et al. Improving Efficiency of Apriori Algorithm Using Transaction Reduction , 2013 .