The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SNORT with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (32) 2005 (26) 2006 (25) 2007 (26) 2008 (32) 2009 (22) 2010-2012 (23) 2013-2016 (16) 2017-2019 (19) 2020-2023 (21)
Publication types (Num. hits)
article(46) book(2) inproceedings(193) phdthesis(1)
Venues (Conferences, Journals, ...)
ACSAC(9) ANCS(8) FPL(7) CoRR(5) FCCM(5) VizSEC(4) ARC(3) IPDPS(3) ISCC(3) NOMS(3) RAID(3) SAC(3) ACG(2) ACM Trans. Embed. Comput. Syst...(2) AINA(2) CCS(2) More (+10 of total 173)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 207 occurrences of 101 keywords

Results
Found 242 publication records. Showing 242 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
141Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan Compiling PCRE to FPGA for accelerating SNORT IDS. Search on Bibsonomy ANCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions
92Pravesh Gaonjur, N. Z. Tarapore, S. G. Pukale, M. L. Dhore Using Neuro-Fuzzy Techniques to reduce false alerts in IDS. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
88Kai Hwang 0001, Min Cai, Ying Chen, Min Qin Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation
79Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan Integrating software specifications into intrusion detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Software specification languages, Intrusion detection, State machines, Attack scenarios
79Mathew Graves, Mohammad Zulkernine Bridging the gap: software specification meets intrusion detector. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack languages, intrusion detection, software security, software specification
71Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez Design of a Snort-Based Hybrid Intrusion Detection System. Search on Bibsonomy IWANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, Intrusion detection systems, Snort, Network IDS
71Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF True positive, DARPA dataset, Intrusion Detection System, False positive, Snort
71Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour RAAS: a reliable analyzer and archiver for snort intrusion detection system. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IDS analyzer, intrusion detection system, archiving, snort
62Barry Irwin, Jean-Pierre van Riel Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Michael Attig, John W. Lockwood SIFT: Snort Intrusion Filter for TCP. Search on Bibsonomy Hot Interconnects The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Richard A. Henders, Bill Opdyke Detecting intruders on a campus network: might the threat be coming from within? Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, snort
62Pedro Alípio, Paulo Carvalho 0002, José Neves 0001 Using CLIPS to Detect Network Intrusions. Search on Bibsonomy EPIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, CLIPS, SNORT, attack scenarios, certainty factors
52Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios Adaptabilty of a GP Based IDS on Wireless Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service
52Sushant Sinha, Farnam Jahanian, Jignesh M. Patel WIND: Workload-Aware INtrusion Detection. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention
49Shahrulniza Musa, David J. Parish Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alert visualization, network security information visualization, alert classification, machine learning
48Robin Sommer, Vern Paxson Enhancing byte-level network intrusion detection signatures with context. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort
45Chad A. Arney, Xinli Wang Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. Search on Bibsonomy RIIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
45Angela Orebaugh, Simon Biles, Jacob Babbin Snort cookbook - solutions and examples for Snort administrators. Search on Bibsonomy 2005   RDF
45Raghavan Muthuregunathan, S. Siddharth, R. Srivathsan, S. R. Rajesh Efficient Snort Rule Generation Using Evolutionary Computing for Network Intrusion Detection. Search on Bibsonomy CICSyN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Genetic Algorithm, Clustering, parallel Computing, Grid, Network Intrusion Detection, Hill Climbing, Snort
45Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke Investigating the problem of IDS false alarms: An experimental study using Snort. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion Detection System, Snort, False Alarm
39Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani Evaluating Intrusion Detection Systems in High Speed Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Derek L. Schuff, Vijay S. Pai Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Chi-Hung Chi, Ming Li 0002, Dongxi Liu A Method to Obtain Signatures from Honeypots Data. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz Systematic Signature Engineering by Re-use of Snort Signatures. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jorge Herrerías Guerrero, Roberto Gómez Cárdenas An example of communication between security tools: iptables - snort. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Linux
35Wojciech Tylman Detecting Computer Intrusions with Bayesian Networks. Search on Bibsonomy IDEAL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Metasploit Framework, Bayesian networks, network intrusion detection, Snort
35Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, pattern matching, processor array, Snort
35Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai Conservative vs. optimistic parallelization of stateful network intrusion detection. Search on Bibsonomy PPoPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallelization, snort
35Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick A GUI for intrusion detection and related experiences. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, snort, NIDS
35Young H. Cho, William H. Mangione-Smith A pattern matching coprocessor for network security. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, pattern matching, intrusion, snort, pattern search
26Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF selective packet discarding, intrusion detection, overload control
26Alok Tongaonkar, R. Sekar 0001, Sreenaath Vasudevan Fast Packet Classification Using Condition Factorization. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, Andrea J. Cullen, John Mellor, Pravin Mirchandani Virtualization in Network Intrusion Detection Systems. Search on Bibsonomy OTM Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Wei Lu 0018, Hengjian Tong Detecting Network Anomalies Using CUSUM and EM Clustering. Search on Bibsonomy ISICA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, Intrusion detection
26Weirong Jiang, Viktor K. Prasanna Field-split parallel architecture for high performance multi-match packet classification using FPGAs. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-match packet classification, fpga, sram, nids
26Young H. Cho, William H. Mangione-Smith Deep network packet filter design for reconfigurable devices. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF string filter, Firewall, worm, network intrusion detection, virus
26Ying Yu, Raymond R. Hoare, Alex K. Jones A CAM-based intrusion detection system for single-packet attack detection. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis Gnort: High Performance Network Intrusion Detection Using Graphics Processors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD
26Tian Song, Wei Zhang, Dongsheng Wang 0002, Yibo Xue A Memory Efficient Multiple Pattern Matching Architecture for Network Security. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Atsushi Yoshioka, Shariful Hasan Shaikot, Min Sik Kim Rule Hashing for Efficient Packet Classification in Network Intrusion Detection. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franzon Hardware Architecture of a Parallel Pattern Matching Engine. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Eduardo Mosqueira-Rey, Amparo Alonso-Betanzos, Belén Baldonedo del Río, Jesús Lago Piñeiro A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Shai Rubin, Somesh Jha, Barton P. Miller Protomatching network traffic for high throughputnetwork intrusion detection. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection, signatures, protocol analysis
26Dionisios N. Pnevmatikatos, Aggelos Arelakis Variable-Length Hashing for Exact Pattern Matching. Search on Bibsonomy FPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi A Method of Generating Highly Efficient String Matching Circuit for Intrusion Detection. Search on Bibsonomy FPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi Highly Efficient String Matching Circuit for IDS with FPGA. Search on Bibsonomy FCCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Randy Smith, Cristian Estan, Somesh Jha Backtracking Algorithmic Complexity Attacks against a NIDS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis Packet pre-filtering for network intrusion detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF packet inspection, packet pre-filtering, intrusion detection
26Michael Attig, John W. Lockwood A framework for rule processing in reconfigurable network systems (abstract only). Search on Bibsonomy FPGA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Kai Hwang 0001, Ying Chen, Hua Liu Defending Distributed Systems Against Malicious Intrusions and Network Anomalies. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Michael Attig, John W. Lockwood A Framework for Rule Processing in Reconfigurable Network Systems. Search on Bibsonomy FCCM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Michael G. Merideth, Priya Narasimhan Elephant: Network Intrusion Detection Systems that Don't Forget. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jingmin Zhou, Adam J. Carlson, Matt Bishop Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao A fast string-matching algorithm for network processor-based intrusion detection system. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network, Intrusion detection, pattern matching, processor
26Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky Honeypot Forensics Part I: Analyzing the Network. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhat, honeypots, honeynets
26Ioannis Sourdis, Dionisios N. Pnevmatikatos Pre-Decoded CAMs for Efficient and High-Speed NIDS Pattern Matching. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Shai Rubin, Somesh Jha, Barton P. Miller Automatic Generation and Analysis of NIDS Attacks. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Christopher R. Clark, David E. Schimmel Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms
26Maya B. Gokhale, Dave Dubois, Andy Dubois, Mike Boorman, Steve Poole 0001, Vic Hogsett Granidt: Towards Gigabit Rate Network Intrusion Detection Technology. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23N. D. Patel, B. M. Mehtre, Rajeev Wankar A Snort-based secure edge router for smart home. Search on Bibsonomy Int. J. Sens. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Kashif Ishaq, Hafiz Ahsan Javed Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Chin-Ling Chen, Jian Lin Lai An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Yi-Cheng Lai, Chiao-Lin Yu, Man-Ling Liao, Yu-Shan Lin, Yao-Chung Chang, Jiann-Liang Chen An Intelligence Defense System with SNORT Rules. Search on Bibsonomy ICACT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Ouafae Elaeraj, Cherkaoui Leghris Study of the SNORT intrusion detection system based on machine learning. Search on Bibsonomy CiSt The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac, Radu Tarabuta Distributed Firewall Traffic Filtering and Intrusion Detection Using Snort on pfSense Firewalls with Random Forest Classification. Search on Bibsonomy TSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Sarah Abdulrezzak, Firas A. Sabir Enhancing Intrusion Prevention in Snort System. Search on Bibsonomy DeSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Abdul Waleed, Abdul Fareed Jamali, Ammar Masood Which open-source IDS? Snort, Suricata or Zeek. Search on Bibsonomy Comput. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Ebrima Jaw, Xueming Wang A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC). Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori, Kalamullah Ramli The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data. Search on Bibsonomy Big Data Cogn. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Felix Erlacher, Falko Dressler On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz Configuration vulnerability in SNORT for Windows Operating Systems. Search on Bibsonomy CSR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Fahmida Rafa, Zinnet Rahman, Md Mahbub Mishu, Morad Hasan, Raiyan Rahman, Dip Nandi Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security. Search on Bibsonomy ICCA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac Network Congestion Solution for FTP Services Based on Distributed Firewall and Snort. Search on Bibsonomy RoEduNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Sumit Badotra, Surya Narayan Panda SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. Search on Bibsonomy Clust. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Jos W. H. M. Uiterwijk Solving Bicoloring-Graph Games on Rectangular Boards - Part 1: Partisan Col and Snort. Search on Bibsonomy ACG The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Jos W. H. M. Uiterwijk Solving Bicoloring-Graph Games on Rectangular Boards - Part 2: Impartial Col and Snort. Search on Bibsonomy ACG The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Kohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi 0001 Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Bo Dai 0007, Zhenhai Zhang, Ling Wang, Yuan Liu APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow. Search on Bibsonomy SmartCom The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Ilayda Gündoüdu, Ali Aydin Selçuk, Süleyman Özarslan Effectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection System. Search on Bibsonomy SIU The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Alka Gupta, Lalit Sen Sharma A categorical survey of state-of-the-art intrusion detection system-Snort. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Igor V. Kotenko, Nikolay Komashinsky Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Assadarat Khurat, Wudhichart Sawangphol An Ontology for SNORT Rule. Search on Bibsonomy JCSSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN. Search on Bibsonomy SKIMA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Mondher Essid, Farah Jemili, Ouajdi Korbaa Distributed Architecture of Snort IDS in Cloud Environment. Search on Bibsonomy ISDA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Nilesh Kunhare, Ritu Tiwari, Joydip Dhar Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks. Search on Bibsonomy HIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Chenxi Li, Jiahai Yang 0001, Guo Li, Kang Wang A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher. Search on Bibsonomy LCN Symposium The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Emre Erturk, Mayank Kumar New Use Cases for Snort: Cloud and Mobile Environments. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
23Dmitrii Kuvaiskii, Somnath Chakrabarti, Mona Vij Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX). Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
23Syed Ali Raza Shah, Biju Issac 0001 Performance comparison of intrusion detection systems and application of machine learning to Snort system. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Xibin Sun, Du Zhang, Mingzhe Liu, Zhuoxin He, Haijie Li, Jiwei Li Detecting and Resolving Inconsistencies in Snort. Search on Bibsonomy ICCI*CC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Ban Mohammed Khammas, Sami Hasan, Rabah Abood Ahmed, Joseph Stephen Bassi, Ismahani Binti Ismail Accuracy Improved Malware Detection Method using Snort Sub-signatures and Machine Learning Techniques. Search on Bibsonomy CEEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks. Search on Bibsonomy HPCC/SmartCity/DSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Maham Qayyum, Wajeeha Hamid, Munam Ali Shah Performance Analysis of Snort using Network Function Virtualization. Search on Bibsonomy ICAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Luan N. Utimura, Kelton A. Costa Aplicação e Análise Comparativa do Desempenho de Classificadores de Padrões para o Sistema de Detecção de Intrusão Snort. Search on Bibsonomy SBRC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Sarvjot kaur Kang, Dale Lindskog, Hamman Samuel An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Ahmed Abdelsalam, Stefano Salsano, François Clad, Pablo Camarillo, Clarence Filsfils SR-Snort: IPv6 Segment Routing Aware IDS/IPS. Search on Bibsonomy NFV-SDN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Imdadul Karim, Quoc-Tuan Vien, Tuan Anh Le 0002, Glenford Mapp A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks. Search on Bibsonomy Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Won Hyung Park, Seongjin Ahn Performance Comparison and Detection Analysis in Snort and Suricata Environment. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Syed Ali Raza Shah, Biju Issac 0001 Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 242 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license