Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan |
Compiling PCRE to FPGA for accelerating SNORT IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2007, Orlando, Florida, USA, December 3-4, 2007, pp. 127-136, 2007, ACM, 978-1-59593-945-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions |
92 | Pravesh Gaonjur, N. Z. Tarapore, S. G. Pukale, M. L. Dhore |
Using Neuro-Fuzzy Techniques to reduce false alerts in IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
88 | Kai Hwang 0001, Min Cai, Ying Chen, Min Qin |
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(1), pp. 41-55, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation |
79 | Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan |
Integrating software specifications into intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(5), pp. 345-357, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Software specification languages, Intrusion detection, State machines, Attack scenarios |
79 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 31, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
71 | Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez |
Design of a Snort-Based Hybrid Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (2) ![In: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living, 10th International Work-Conference on Artificial Neural Networks, IWANN 2009 Workshops, Salamanca, Spain, June 10-12, 2009. Proceedings, Part II, pp. 515-522, 2009, Springer, 978-3-642-02480-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, Intrusion detection systems, Snort, Network IDS |
71 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 139-150, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
True positive, DARPA dataset, Intrusion Detection System, False positive, Snort |
71 | Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour |
RAAS: a reliable analyzer and archiver for snort intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 259-263, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IDS analyzer, intrusion detection system, archiving, snort |
62 | Barry Irwin, Jean-Pierre van Riel |
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007, pp. 255-273, 2007, Springer, 978-3-540-78242-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Michael Attig, John W. Lockwood |
SIFT: Snort Intrusion Filter for TCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hot Interconnects ![In: 13th Annual IEEE Symposium on High Performance Interconnects (HOTIC 2005), 17-19 August 2005, Stanford, CA, USA, pp. 121-127, 2005, IEEE Computer Society, 0-7695-2449-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Richard A. Henders, Bill Opdyke |
Detecting intruders on a campus network: might the threat be coming from within? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 113-117, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, snort |
62 | Pedro Alípio, Paulo Carvalho 0002, José Neves 0001 |
Using CLIPS to Detect Network Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA ![In: Progress in Artificial Intelligence, 11th Protuguese Conference on Artificial Intelligence, EPIA 2003, Beja, Portugal, December 4-7, 2003, Proceedings, pp. 341-354, 2003, Springer, 3-540-20589-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, CLIPS, SNORT, attack scenarios, certainty factors |
52 | Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios |
Adaptabilty of a GP Based IDS on Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 310-318, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service |
52 | Sushant Sinha, Farnam Jahanian, Jignesh M. Patel |
WIND: Workload-Aware INtrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 290-310, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention |
49 | Shahrulniza Musa, David J. Parish |
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings, pp. 169-180, 2008, Springer, 978-3-540-85931-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert visualization, network security information visualization, alert classification, machine learning |
48 | Robin Sommer, Vern Paxson |
Enhancing byte-level network intrusion detection signatures with context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 262-271, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort |
45 | Chad A. Arney, Xinli Wang |
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIIT ![In: Proceedings of the 5th Annual Conference on Research in Information Technology, RIIT 2016, Boston, MA, USA, September 28 - October 1, 2016, pp. 54, 2016, ACM, 978-1-4503-4453-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Angela Orebaugh, Simon Biles, Jacob Babbin |
Snort cookbook - solutions and examples for Snort administrators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2005 |
RDF |
|
45 | Raghavan Muthuregunathan, S. Siddharth, R. Srivathsan, S. R. Rajesh |
Efficient Snort Rule Generation Using Evolutionary Computing for Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009, Indore, India, 23-25 July, 2009, pp. 336-341, 2009, IEEE Computer Society, 978-0-7695-3743-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Genetic Algorithm, Clustering, parallel Computing, Grid, Network Intrusion Detection, Hill Climbing, Snort |
45 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
Investigating the problem of IDS false alarms: An experimental study using Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 253-267, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection System, Snort, False Alarm |
39 | Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani |
Evaluating Intrusion Detection Systems in High Speed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 454-459, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Derek L. Schuff, Vijay S. Pai |
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-10, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Chi-Hung Chi, Ming Li 0002, Dongxi Liu |
A Method to Obtain Signatures from Honeypots Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings, pp. 435-442, 2004, Springer, 3-540-23388-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz |
Systematic Signature Engineering by Re-use of Snort Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 23-32, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jorge Herrerías Guerrero, Roberto Gómez Cárdenas |
An example of communication between security tools: iptables - snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(3), pp. 34-43, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Linux |
35 | Wojciech Tylman |
Detecting Computer Intrusions with Bayesian Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2009, 10th International Conference, Burgos, Spain, September 23-26, 2009. Proceedings, pp. 82-91, 2009, Springer, 978-3-642-04393-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Metasploit Framework, Bayesian networks, network intrusion detection, Snort |
35 | Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung |
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 991-996, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, pattern matching, processor array, Snort |
35 | Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai |
Conservative vs. optimistic parallelization of stateful network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPoPP ![In: Proceedings of the 12th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPOPP 2007, San Jose, California, USA, March 14-17, 2007, pp. 138-139, 2007, ACM, 978-1-59593-602-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
parallelization, snort |
35 | Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick |
A GUI for intrusion detection and related experiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 191-192, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, snort, NIDS |
35 | Young H. Cho, William H. Mangione-Smith |
A pattern matching coprocessor for network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 42nd Design Automation Conference, DAC 2005, San Diego, CA, USA, June 13-17, 2005, pp. 234-239, 2005, ACM, 1-59593-058-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network security, pattern matching, intrusion, snort, pattern search |
26 | Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos |
Improving the accuracy of network intrusion detection systems under load using selective packet discarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010, pp. 15-21, 2010, ACM, 978-1-4503-0059-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
selective packet discarding, intrusion detection, overload control |
26 | Alok Tongaonkar, R. Sekar 0001, Sreenaath Vasudevan |
Fast Packet Classification Using Condition Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 417-436, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, Andrea J. Cullen, John Mellor, Pravin Mirchandani |
Virtualization in Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2009 Workshops, Confederated International Workshops and Posters, ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009, Vilamoura, Portugal, November 1-6, 2009. Proceedings, pp. 6-8, 2009, Springer, 978-3-642-05289-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Wei Lu 0018, Hengjian Tong |
Detecting Network Anomalies Using CUSUM and EM Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, 4th International Symposium, ISICA 2009, Huangshi, China, Ocotober 23-25, 2009, Proceedings, pp. 297-308, 2009, Springer, 978-3-642-04842-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, Intrusion detection |
26 | Weirong Jiang, Viktor K. Prasanna |
Field-split parallel architecture for high performance multi-match packet classification using FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, Calgary, Alberta, Canada, August 11-13, 2009, pp. 188-196, 2009, ACM, 978-1-60558-606-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-match packet classification, fpga, sram, nids |
26 | Young H. Cho, William H. Mangione-Smith |
Deep network packet filter design for reconfigurable devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 7(2), pp. 21:1-21:26, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
string filter, Firewall, worm, network intrusion detection, virus |
26 | Ying Yu, Raymond R. Hoare, Alex K. Jones |
A CAM-based intrusion detection system for single-packet attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 116-134, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD |
26 | Tian Song, Wei Zhang, Dongsheng Wang 0002, Yibo Xue |
A Memory Efficient Multiple Pattern Matching Architecture for Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 166-170, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Atsushi Yoshioka, Shariful Hasan Shaikot, Min Sik Kim |
Rule Hashing for Efficient Packet Classification in Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 17th International Conference on Computer Communications and Networks, IEEE ICCCN 2008, St. Thomas, U.S. Virgin Islands, August 3-7, 2008, pp. 614-619, 2008, IEEE, 978-1-4244-2390-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franzon |
Hardware Architecture of a Parallel Pattern Matching Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA, pp. 1369-1372, 2007, IEEE, 1-4244-0920-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Eduardo Mosqueira-Rey, Amparo Alonso-Betanzos, Belén Baldonedo del Río, Jesús Lago Piñeiro |
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 466-475, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Shai Rubin, Somesh Jha, Barton P. Miller |
Protomatching network traffic for high throughputnetwork intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 47-58, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, signatures, protocol analysis |
26 | Dionisios N. Pnevmatikatos, Aggelos Arelakis |
Variable-Length Hashing for Exact Pattern Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006, pp. 1-6, 2006, IEEE, 1-4244-0312-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi |
A Method of Generating Highly Efficient String Matching Circuit for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006, pp. 1-4, 2006, IEEE, 1-4244-0312-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi |
Highly Efficient String Matching Circuit for IDS with FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 14th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2006), 24-26 April 2006, Napa, CA, USA, Proceedings, pp. 285-286, 2006, IEEE Computer Society, 0-7695-2661-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 89-98, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis |
Packet pre-filtering for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2006, San Jose, California, USA, December 3-5, 2006, pp. 183-192, 2006, ACM, 1-59593-580-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
packet inspection, packet pre-filtering, intrusion detection |
26 | Michael Attig, John W. Lockwood |
A framework for rule processing in reconfigurable network systems (abstract only). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 13th International Symposium on Field Programmable Gate Arrays, FPGA 2005, Monterey, California, USA, February 20-22, 2005, pp. 277, 2005, ACM, 1-59593-029-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Kai Hwang 0001, Ying Chen, Hua Liu |
Defending Distributed Systems Against Malicious Intrusions and Network Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael Attig, John W. Lockwood |
A Framework for Rule Processing in Reconfigurable Network Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 13th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2005), 17-20 April 2005, Napa, CA, USA, Proceedings, pp. 225-234, 2005, IEEE Computer Society, 0-7695-2445-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael G. Merideth, Priya Narasimhan |
Elephant: Network Intrusion Detection Systems that Don't Forget. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jingmin Zhou, Adam J. Carlson, Matt Bishop |
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 117-126, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao |
A fast string-matching algorithm for network processor-based intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 3(3), pp. 614-633, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
network, Intrusion detection, pattern matching, processor |
26 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 72-78, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
26 | Ioannis Sourdis, Dionisios N. Pnevmatikatos |
Pre-Decoded CAMs for Efficient and High-Speed NIDS Pattern Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 12th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2004), 20-23 April 2004, Napa, CA, USA, Proceedings, pp. 258-267, 2004, IEEE Computer Society, 0-7695-2230-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Shai Rubin, Somesh Jha, Barton P. Miller |
Automatic Generation and Analysis of NIDS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 28-38, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Christopher R. Clark, David E. Schimmel |
Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 13th International Conference, FPL 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings, pp. 956-959, 2003, Springer, 3-540-40822-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 234-244, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
26 | Maya B. Gokhale, Dave Dubois, Andy Dubois, Mike Boorman, Steve Poole 0001, Vic Hogsett |
Granidt: Towards Gigabit Rate Network Intrusion Detection Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, FPL 2002, Montpellier, France, September 2-4, 2002, Proceedings, pp. 404-413, 2002, Springer, 3-540-44108-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | N. D. Patel, B. M. Mehtre, Rajeev Wankar |
A Snort-based secure edge router for smart home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Sens. Networks ![In: Int. J. Sens. Networks 41(1), pp. 42-59, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kashif Ishaq, Hafiz Ahsan Javed |
Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.13589, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Chin-Ling Chen, Jian Lin Lai |
An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(13), pp. 6139, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yi-Cheng Lai, Chiao-Lin Yu, Man-Ling Liao, Yu-Shan Lin, Yao-Chung Chang, Jiann-Liang Chen |
An Intelligence Defense System with SNORT Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 25th International Conference on Advanced Communication Technology, ICACT 2023, Pyeongchang, Korea, Republic of, February 19-22, 2023, pp. 249-254, 2023, IEEE, 979-11-88428-10-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ouafae Elaeraj, Cherkaoui Leghris |
Study of the SNORT intrusion detection system based on machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CiSt ![In: 7th IEEE Congress on Information Science and Technology, CiSt 2023, Agadir - Essaouira, Morocco, December 16-22, 2023, pp. 33-37, 2023, IEEE, 978-1-6654-6133-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac, Radu Tarabuta |
Distributed Firewall Traffic Filtering and Intrusion Detection Using Snort on pfSense Firewalls with Random Forest Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TSP ![In: 46th International Conference on Telecommunications and Signal Processing, TSP 2023, Prague, Czech Republic, July 12-14, 2023, pp. 101-104, 2023, IEEE, 979-8-3503-0396-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Sarah Abdulrezzak, Firas A. Sabir |
Enhancing Intrusion Prevention in Snort System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DeSE ![In: 15th International Conference on Developments in eSystems Engineering, DeSE 2023, Baghdad & Anbar, Iraq, January 9-12, 2023, pp. 88-93, 2023, IEEE, 979-8-3503-3514-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Abdul Waleed, Abdul Fareed Jamali, Ammar Masood |
Which open-source IDS? Snort, Suricata or Zeek. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 213, pp. 109116, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ebrima Jaw, Xueming Wang |
A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 8, pp. e900, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori, Kalamullah Ramli |
The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data Cogn. Comput. ![In: Big Data Cogn. Comput. 6(1), pp. 19, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Felix Erlacher, Falko Dressler |
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(1), pp. 495-506, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz |
Configuration vulnerability in SNORT for Windows Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2022, Rhodes, Greece, July 27-29, 2022, pp. 82-89, 2022, IEEE, 978-1-6654-9952-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Fahmida Rafa, Zinnet Rahman, Md Mahbub Mishu, Morad Hasan, Raiyan Rahman, Dip Nandi |
Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCA ![In: ICCA 2022: 2nd International Conference on Computing Advancements, Dhaka, Bangladesh, March 10 - 12, 2022, pp. 199-206, 2022, ACM, 978-1-4503-9734-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac |
Network Congestion Solution for FTP Services Based on Distributed Firewall and Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoEduNet ![In: 21st RoEduNet Conference: Networking in Education and Research, RoEduNet 2022, Sovata, Romania, September 15-16, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-5528-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sumit Badotra, Surya Narayan Panda |
SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 24(1), pp. 501-513, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jos W. H. M. Uiterwijk |
Solving Bicoloring-Graph Games on Rectangular Boards - Part 1: Partisan Col and Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACG ![In: Advances in Computer Games - 17th International Conference, ACG 2021, Virtual Event, November 23-25, 2021, Revised Selected Papers, pp. 96-106, 2021, Springer, 978-3-031-11487-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jos W. H. M. Uiterwijk |
Solving Bicoloring-Graph Games on Rectangular Boards - Part 2: Impartial Col and Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACG ![In: Advances in Computer Games - 17th International Conference, ACG 2021, Virtual Event, November 23-25, 2021, Revised Selected Papers, pp. 107-117, 2021, Springer, 978-3-031-11487-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Kohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi 0001 |
Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021, pp. 329-331, 2021, ACM, 978-1-4503-8143-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Bo Dai 0007, Zhenhai Zhang, Ling Wang, Yuan Liu |
APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartCom ![In: Smart Computing and Communication - 6th International Conference, SmartCom 2021, New York City, NY, USA, December 29-31, 2021, Proceedings, pp. 340-351, 2021, Springer, 978-3-030-97773-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Ilayda Gündoüdu, Ali Aydin Selçuk, Süleyman Özarslan |
Effectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIU ![In: 29th Signal Processing and Communications Applications Conference, SIU 2021, Istanbul, Turkey, June 9-11, 2021, pp. 1-4, 2021, IEEE, 978-1-6654-3649-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Alka Gupta, Lalit Sen Sharma |
A categorical survey of state-of-the-art intrusion detection system-Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 13(3/4), pp. 337-356, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Igor V. Kotenko, Nikolay Komashinsky |
Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019, pp. 16:1-16:8, 2019, ACM, 978-1-4503-7242-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Assadarat Khurat, Wudhichart Sawangphol |
An Ontology for SNORT Rule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCSSE ![In: 16th International Joint Conference on Computer Science and Software Engineering, JCSSE 2019, Chonburi, Thailand, July 10-12, 2019, pp. 49-55, 2019, IEEE, 978-1-7281-0719-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal |
Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SKIMA ![In: 13th International Conference on Software, Knowledge, Information Management and Applications, SKIMA 2019, Island of Ulkulhas, Maldives, August 26-28, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-2741-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Mondher Essid, Farah Jemili, Ouajdi Korbaa |
Distributed Architecture of Snort IDS in Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA ![In: Intelligent Systems Design and Applications - 19th International Conference on Intelligent Systems Design and Applications (ISDA 2019), Auburn, WA, USA, December 3-5, 2019, pp. 100-111, 2019, Springer, 978-3-030-49341-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Nilesh Kunhare, Ritu Tiwari, Joydip Dhar |
Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS ![In: Hybrid Intelligent Systems - 19th International Conference on Hybrid Intelligent Systems (HIS 2019) held in Bhopal, India, December 10-12, 2019, pp. 362-375, 2019, Springer, 978-3-030-49335-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Chenxi Li, Jiahai Yang 0001, Guo Li, Kang Wang |
A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN Symposium ![In: 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany, October 14-17, 2019, pp. 175-182, 2019, IEEE, 978-1-7281-2561-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Emre Erturk, Mayank Kumar |
New Use Cases for Snort: Cloud and Mobile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.02359, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
23 | Dmitrii Kuvaiskii, Somnath Chakrabarti, Mona Vij |
Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.00508, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
23 | Syed Ali Raza Shah, Biju Issac 0001 |
Performance comparison of intrusion detection systems and application of machine learning to Snort system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 80, pp. 157-170, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Xibin Sun, Du Zhang, Mingzhe Liu, Zhuoxin He, Haijie Li, Jiwei Li |
Detecting and Resolving Inconsistencies in Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCI*CC ![In: 17th IEEE International Conference on Cognitive Informatics & Cognitive Computing, ICCI*CC 2018, Berkeley, CA, USA, July 16-18, 2018, pp. 552-560, 2018, IEEE Computer Society, 978-1-5386-3360-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ban Mohammed Khammas, Sami Hasan, Rabah Abood Ahmed, Joseph Stephen Bassi, Ismahani Binti Ismail |
Accuracy Improved Malware Detection Method using Snort Sub-signatures and Machine Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEEC ![In: 2018 10th Computer Science and Electronic Engineering Conference, CEEC 2018, University of Essex, Colchester, UK, September 19-21, 2018, pp. 107-112, 2018, IEEE, 978-1-5386-7275-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal |
Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/SmartCity/DSS ![In: 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, Exeter, United Kingdom, June 28-30, 2018, pp. 915-920, 2018, IEEE, 978-1-5386-6614-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Maham Qayyum, Wajeeha Hamid, Munam Ali Shah |
Performance Analysis of Snort using Network Function Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: 24th International Conference on Automation and Computing, ICAC 2018, Newcastle upon Tyne, United Kingdom, September 6-7, 2018, pp. 1-6, 2018, IEEE, 978-1-86220-341-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Luan N. Utimura, Kelton A. Costa |
Aplicação e Análise Comparativa do Desempenho de Classificadores de Padrões para o Sistema de Detecção de Intrusão Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBRC ![In: XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2018, Campos do Jordão, Brazil, May 6-10, 2018, pp. 337-350, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Sarvjot kaur Kang, Dale Lindskog, Hamman Samuel |
An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018, pp. 1521-1525, 2018, IEEE, 978-1-5386-4388-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Abdelsalam, Stefano Salsano, François Clad, Pablo Camarillo, Clarence Filsfils |
SR-Snort: IPv6 Segment Routing Aware IDS/IPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NFV-SDN ![In: IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2018, Verona, Italy, November 27-29, 2018, pp. 1-2, 2018, IEEE, 978-1-5386-8281-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Imdadul Karim, Quoc-Tuan Vien, Tuan Anh Le 0002, Glenford Mapp |
A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 6(1), pp. 6, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Won Hyung Park, Seongjin Ahn |
Performance Comparison and Detection Analysis in Snort and Suricata Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 94(2), pp. 241-252, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Syed Ali Raza Shah, Biju Issac 0001 |
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1710.04843, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|