共 50 条
- [44] Design of a worm isolation and unknown worm monitoring system based on Honeypot PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 656 - 659
- [45] An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 169 - 169
- [46] Implementation and Performance Evaluation of Network Intrusion Detection Systems UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 484 - 495
- [47] Performance Evaluation of Intrusion Detection System Using Anomaly and Signature based algorithms to Reduction False Alarm Rate and Detect Unknown Attacks 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1064 - 1069
- [48] An Improved Snort Intrusion Detection System Based on Self-similar Traffic Model 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 939 - 942
- [49] Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 905 - 912