Intrusion Detection and Prevention Systems: An Updated Review
暂无分享,去创建一个
Sanjay Misra | Adewole Adewumi | Charles Van der Vyver | Ravin Ahuja | Nureni Ayofe Azeez | Taiwo Mayowa Bada | S. Misra | Ravin Ahuja | N. Azeez | A. Adewumi | C. V. D. Vyver
[1] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[2] Sharmasth Yerur,et al. Proactive Hybrid Intrusion Prevention System for Mobile Adhoc Networks , 2017 .
[3] Malek Ben Salem,et al. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned , 2011 .
[4] Dumitru Baleanu,et al. New Derivatives on the Fractal Subset of Real-Line , 2015, Entropy.
[5] Alan R. Simon,et al. Network security , 1994 .
[6] J. Amudhavel,et al. A Survey on Intrusion Detection System: State of the Art Review , 2016 .
[7] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[8] Václav Přenosil,et al. A Survey on Intrusion Detection and Prevention Systems , 2014 .
[9] Ahmad Sharifi,et al. An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security Issues , 2014 .
[10] Amrit Pal Singh,et al. Analysis of Host-Based and Network-Based Intrusion Detection System , 2014 .
[11] J. Anuradha,et al. Network Security and Types of Attacks in Network , 2015 .
[12] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[13] Khelchandra Thongam,et al. Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks , 2016, Entropy.