A Comparative Analysis of the Snort and Suricata Intrusion-Detection Systems
暂无分享,去创建一个
[1] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[2] David J. Day,et al. A performance analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines , 2011, ICDS 2011.
[3] Thomas Tenhunen. Implementing an Intrusion Detection System in the Mysea Architecture , 2008 .
[4] Gaurav Kumar,et al. Spectrum of Effective Security Trust Architecture to Manage the Interception of Packet Transmission in Value Added Networks , 2011 .
[5] Gordon E. Moore. Cramming more components onto integrated circuits With unit cost falling as the number of components per circuit rises , by 1975 economics may dictate squeezing as many as 65 , 000 components on a single silicon chip , .
[6] Mark Fabro,et al. Control Systems Cyber Security: Defense-in-Depth Strategies , 2006 .