Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers
暂无分享,去创建一个
[1] Ana R. Cavalli,et al. Estimation of QoE of video traffic using a fuzzy expert system , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[2] Vasaka Visoottiviseth,et al. Evaluation studies of three intrusion detection systems under various attacks and rule sets , 2013, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013).
[3] Jeanna Neefe Matthews,et al. Quantitative analysis of intrusion detection systems: Snort and Suricata , 2013, Defense, Security, and Sensing.
[4] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[5] A Saritha,et al. A system for detecting network intruders in real-time , 2016 .
[6] Leyla Bilge,et al. Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis , 2012, ACSAC '12.
[7] Michel Bourdellès,et al. Events-Based Security Monitoring Using MMT Tool , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[8] Neil C. Rowe,et al. A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.