共 10 条
[1]
Almutairi A. H., 2017, PROC INT C FRONTIERS, P1
[2]
Dynamically Detecting Security Threats and Updating a Signature Based Intrusion Detection System's Database
[J].
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019),
2019, 159
:1507-1516
[3]
[Anonymous], 2019, U.S
[4]
[Anonymous], 2019, KASP SEC B 2019
[5]
Debar H., 2000, Proc. Connect, V2000, P1
[6]
Folorunso O., 2016, J INF PRIVACY SECUR, V12, P181, DOI DOI 10.1080/15536548.2016.1257680
[7]
Innella Paul., 2001, An Introduction to Intrusion Detection Systems
[8]
Rademacher L., 2017, The Disadvantages of Intrusion Detection Systems
[9]
Sheenam S. D., 2016, IOSR J COMPUTER ENG, V18, P20
[10]
Uddin M., 2010, INT J NETWORK SECURI, P129