Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan |
Compiling PCRE to FPGA for accelerating SNORT IDS.  |
ANCS  |
2007 |
DBLP DOI BibTeX RDF |
deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions |
92 | Pravesh Gaonjur, N. Z. Tarapore, S. G. Pukale, M. L. Dhore |
Using Neuro-Fuzzy Techniques to reduce false alerts in IDS.  |
ICON  |
2008 |
DBLP DOI BibTeX RDF |
|
88 | Kai Hwang 0001, Min Cai, Ying Chen, Min Qin |
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes.  |
IEEE Trans. Dependable Secur. Comput.  |
2007 |
DBLP DOI BibTeX RDF |
SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation |
79 | Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan |
Integrating software specifications into intrusion detection.  |
Int. J. Inf. Sec.  |
2007 |
DBLP DOI BibTeX RDF |
Software specification languages, Intrusion detection, State machines, Attack scenarios |
79 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector.  |
PST  |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
71 | Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez |
Design of a Snort-Based Hybrid Intrusion Detection System.  |
IWANN (2)  |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, Intrusion detection systems, Snort, Network IDS |
71 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.  |
TrustBus  |
2008 |
DBLP DOI BibTeX RDF |
True positive, DARPA dataset, Intrusion Detection System, False positive, Snort |
71 | Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour |
RAAS: a reliable analyzer and archiver for snort intrusion detection system.  |
SAC  |
2007 |
DBLP DOI BibTeX RDF |
IDS analyzer, intrusion detection system, archiving, snort |
62 | Barry Irwin, Jean-Pierre van Riel |
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope.  |
VizSEC  |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Michael Attig, John W. Lockwood |
SIFT: Snort Intrusion Filter for TCP.  |
Hot Interconnects  |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Richard A. Henders, Bill Opdyke |
Detecting intruders on a campus network: might the threat be coming from within?  |
SIGUCCS  |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, snort |
62 | Pedro Alípio, Paulo Carvalho 0002, José Neves 0001 |
Using CLIPS to Detect Network Intrusions.  |
EPIA  |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, CLIPS, SNORT, attack scenarios, certainty factors |
52 | Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios |
Adaptabilty of a GP Based IDS on Wireless Networks.  |
ARES  |
2008 |
DBLP DOI BibTeX RDF |
Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service |
52 | Sushant Sinha, Farnam Jahanian, Jignesh M. Patel |
WIND: Workload-Aware INtrusion Detection.  |
RAID  |
2006 |
DBLP DOI BibTeX RDF |
workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention |
49 | Shahrulniza Musa, David J. Parish |
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.  |
VizSEC  |
2008 |
DBLP DOI BibTeX RDF |
alert visualization, network security information visualization, alert classification, machine learning |
48 | Robin Sommer, Vern Paxson |
Enhancing byte-level network intrusion detection signatures with context.  |
CCS  |
2003 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort |
45 | Chad A. Arney, Xinli Wang |
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules.  |
RIIT  |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Angela Orebaugh, Simon Biles, Jacob Babbin |
Snort cookbook - solutions and examples for Snort administrators.  |
|
2005 |
RDF |
|
45 | Raghavan Muthuregunathan, S. Siddharth, R. Srivathsan, S. R. Rajesh |
Efficient Snort Rule Generation Using Evolutionary Computing for Network Intrusion Detection.  |
CICSyN  |
2009 |
DBLP DOI BibTeX RDF |
Genetic Algorithm, Clustering, parallel Computing, Grid, Network Intrusion Detection, Hill Climbing, Snort |
45 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
Investigating the problem of IDS false alarms: An experimental study using Snort.  |
SEC  |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection System, Snort, False Alarm |
39 | Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani |
Evaluating Intrusion Detection Systems in High Speed Networks.  |
IAS  |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Derek L. Schuff, Vijay S. Pai |
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface.  |
IPDPS  |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Chi-Hung Chi, Ming Li 0002, Dongxi Liu |
A Method to Obtain Signatures from Honeypots Data.  |
NPC  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz |
Systematic Signature Engineering by Re-use of Snort Signatures.  |
ACSAC  |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jorge Herrerías Guerrero, Roberto Gómez Cárdenas |
An example of communication between security tools: iptables - snort.  |
ACM SIGOPS Oper. Syst. Rev.  |
2005 |
DBLP DOI BibTeX RDF |
Linux |
35 | Wojciech Tylman |
Detecting Computer Intrusions with Bayesian Networks.  |
IDEAL  |
2009 |
DBLP DOI BibTeX RDF |
Metasploit Framework, Bayesian networks, network intrusion detection, Snort |
35 | Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung |
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System.  |
AINA  |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, pattern matching, processor array, Snort |
35 | Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai |
Conservative vs. optimistic parallelization of stateful network intrusion detection.  |
PPoPP  |
2007 |
DBLP DOI BibTeX RDF |
parallelization, snort |
35 | Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick |
A GUI for intrusion detection and related experiences.  |
ACM Southeast Regional Conference (2)  |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, snort, NIDS |
35 | Young H. Cho, William H. Mangione-Smith |
A pattern matching coprocessor for network security.  |
DAC  |
2005 |
DBLP DOI BibTeX RDF |
network security, pattern matching, intrusion, snort, pattern search |
26 | Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos |
Improving the accuracy of network intrusion detection systems under load using selective packet discarding.  |
EUROSEC  |
2010 |
DBLP DOI BibTeX RDF |
selective packet discarding, intrusion detection, overload control |
26 | Alok Tongaonkar, R. Sekar 0001, Sreenaath Vasudevan |
Fast Packet Classification Using Condition Factorization.  |
ACNS  |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, Andrea J. Cullen, John Mellor, Pravin Mirchandani |
Virtualization in Network Intrusion Detection Systems.  |
OTM Workshops  |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Wei Lu 0018, Hengjian Tong |
Detecting Network Anomalies Using CUSUM and EM Clustering.  |
ISICA  |
2009 |
DBLP DOI BibTeX RDF |
clustering, Intrusion detection |
26 | Weirong Jiang, Viktor K. Prasanna |
Field-split parallel architecture for high performance multi-match packet classification using FPGAs.  |
SPAA  |
2009 |
DBLP DOI BibTeX RDF |
multi-match packet classification, fpga, sram, nids |
26 | Young H. Cho, William H. Mangione-Smith |
Deep network packet filter design for reconfigurable devices.  |
ACM Trans. Embed. Comput. Syst.  |
2008 |
DBLP DOI BibTeX RDF |
string filter, Firewall, worm, network intrusion detection, virus |
26 | Ying Yu, Raymond R. Hoare, Alex K. Jones |
A CAM-based intrusion detection system for single-packet attack detection.  |
IPDPS  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
Gnort: High Performance Network Intrusion Detection Using Graphics Processors.  |
RAID  |
2008 |
DBLP DOI BibTeX RDF |
parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD |
26 | Tian Song, Wei Zhang, Dongsheng Wang 0002, Yibo Xue |
A Memory Efficient Multiple Pattern Matching Architecture for Network Security.  |
INFOCOM  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Atsushi Yoshioka, Shariful Hasan Shaikot, Min Sik Kim |
Rule Hashing for Efficient Packet Classification in Network Intrusion Detection.  |
ICCCN  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franzon |
Hardware Architecture of a Parallel Pattern Matching Engine.  |
ISCAS  |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Eduardo Mosqueira-Rey, Amparo Alonso-Betanzos, Belén Baldonedo del Río, Jesús Lago Piñeiro |
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture.  |
KES-AMSTA  |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Shai Rubin, Somesh Jha, Barton P. Miller |
Protomatching network traffic for high throughputnetwork intrusion detection.  |
CCS  |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, signatures, protocol analysis |
26 | Dionisios N. Pnevmatikatos, Aggelos Arelakis |
Variable-Length Hashing for Exact Pattern Matching.  |
FPL  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi |
A Method of Generating Highly Efficient String Matching Circuit for Intrusion Detection.  |
FPL  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi |
Highly Efficient String Matching Circuit for IDS with FPGA.  |
FCCM  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS.  |
ACSAC  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis |
Packet pre-filtering for network intrusion detection.  |
ANCS  |
2006 |
DBLP DOI BibTeX RDF |
packet inspection, packet pre-filtering, intrusion detection |
26 | Michael Attig, John W. Lockwood |
A framework for rule processing in reconfigurable network systems (abstract only).  |
FPGA  |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Kai Hwang 0001, Ying Chen, Hua Liu |
Defending Distributed Systems Against Malicious Intrusions and Network Anomalies.  |
IPDPS  |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael Attig, John W. Lockwood |
A Framework for Rule Processing in Reconfigurable Network Systems.  |
FCCM  |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael G. Merideth, Priya Narasimhan |
Elephant: Network Intrusion Detection Systems that Don't Forget.  |
HICSS  |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jingmin Zhou, Adam J. Carlson, Matt Bishop |
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis.  |
ACSAC  |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao |
A fast string-matching algorithm for network processor-based intrusion detection system.  |
ACM Trans. Embed. Comput. Syst.  |
2004 |
DBLP DOI BibTeX RDF |
network, Intrusion detection, pattern matching, processor |
26 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network.  |
IEEE Secur. Priv.  |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
26 | Ioannis Sourdis, Dionisios N. Pnevmatikatos |
Pre-Decoded CAMs for Efficient and High-Speed NIDS Pattern Matching.  |
FCCM  |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Shai Rubin, Somesh Jha, Barton P. Miller |
Automatic Generation and Analysis of NIDS Attacks.  |
ACSAC  |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Christopher R. Clark, David E. Schimmel |
Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns.  |
FPL  |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS.  |
ACSAC  |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
26 | Maya B. Gokhale, Dave Dubois, Andy Dubois, Mike Boorman, Steve Poole 0001, Vic Hogsett |
Granidt: Towards Gigabit Rate Network Intrusion Detection Technology.  |
FPL  |
2002 |
DBLP DOI BibTeX RDF |
|
23 | N. D. Patel, B. M. Mehtre, Rajeev Wankar |
A Snort-based secure edge router for smart home.  |
Int. J. Sens. Networks  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kashif Ishaq, Hafiz Ahsan Javed |
Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis.  |
CoRR  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Chin-Ling Chen, Jian Lin Lai |
An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort.  |
Sensors  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yi-Cheng Lai, Chiao-Lin Yu, Man-Ling Liao, Yu-Shan Lin, Yao-Chung Chang, Jiann-Liang Chen |
An Intelligence Defense System with SNORT Rules.  |
ICACT  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ouafae Elaeraj, Cherkaoui Leghris |
Study of the SNORT intrusion detection system based on machine learning.  |
CiSt  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac, Radu Tarabuta |
Distributed Firewall Traffic Filtering and Intrusion Detection Using Snort on pfSense Firewalls with Random Forest Classification.  |
TSP  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Sarah Abdulrezzak, Firas A. Sabir |
Enhancing Intrusion Prevention in Snort System.  |
DeSE  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Abdul Waleed, Abdul Fareed Jamali, Ammar Masood |
Which open-source IDS? Snort, Suricata or Zeek.  |
Comput. Networks  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ebrima Jaw, Xueming Wang |
A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC).  |
PeerJ Comput. Sci.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori, Kalamullah Ramli |
The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data.  |
Big Data Cogn. Comput.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Felix Erlacher, Falko Dressler |
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures.  |
IEEE Trans. Dependable Secur. Comput.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz |
Configuration vulnerability in SNORT for Windows Operating Systems.  |
CSR  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Fahmida Rafa, Zinnet Rahman, Md Mahbub Mishu, Morad Hasan, Raiyan Rahman, Dip Nandi |
Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security.  |
ICCA  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac |
Network Congestion Solution for FTP Services Based on Distributed Firewall and Snort.  |
RoEduNet  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sumit Badotra, Surya Narayan Panda |
SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking.  |
Clust. Comput.  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jos W. H. M. Uiterwijk |
Solving Bicoloring-Graph Games on Rectangular Boards - Part 1: Partisan Col and Snort.  |
ACG  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jos W. H. M. Uiterwijk |
Solving Bicoloring-Graph Games on Rectangular Boards - Part 2: Impartial Col and Snort.  |
ACG  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Kohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi 0001 |
Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort.  |
CODASPY  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Bo Dai 0007, Zhenhai Zhang, Ling Wang, Yuan Liu |
APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow.  |
SmartCom  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Ilayda Gündoüdu, Ali Aydin Selçuk, Süleyman Özarslan |
Effectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection System.  |
SIU  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Alka Gupta, Lalit Sen Sharma |
A categorical survey of state-of-the-art intrusion detection system-Snort.  |
Int. J. Inf. Comput. Secur.  |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Igor V. Kotenko, Nikolay Komashinsky |
Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework.  |
SIN  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Assadarat Khurat, Wudhichart Sawangphol |
An Ontology for SNORT Rule.  |
JCSSE  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal |
Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN.  |
SKIMA  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Mondher Essid, Farah Jemili, Ouajdi Korbaa |
Distributed Architecture of Snort IDS in Cloud Environment.  |
ISDA  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Nilesh Kunhare, Ritu Tiwari, Joydip Dhar |
Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks.  |
HIS  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Chenxi Li, Jiahai Yang 0001, Guo Li, Kang Wang |
A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher.  |
LCN Symposium  |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Emre Erturk, Mayank Kumar |
New Use Cases for Snort: Cloud and Mobile Environments.  |
CoRR  |
2018 |
DBLP BibTeX RDF |
|
23 | Dmitrii Kuvaiskii, Somnath Chakrabarti, Mona Vij |
Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX).  |
CoRR  |
2018 |
DBLP BibTeX RDF |
|
23 | Syed Ali Raza Shah, Biju Issac 0001 |
Performance comparison of intrusion detection systems and application of machine learning to Snort system.  |
Future Gener. Comput. Syst.  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Xibin Sun, Du Zhang, Mingzhe Liu, Zhuoxin He, Haijie Li, Jiwei Li |
Detecting and Resolving Inconsistencies in Snort.  |
ICCI*CC  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ban Mohammed Khammas, Sami Hasan, Rabah Abood Ahmed, Joseph Stephen Bassi, Ismahani Binti Ismail |
Accuracy Improved Malware Detection Method using Snort Sub-signatures and Machine Learning Techniques.  |
CEEC  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal |
Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks.  |
HPCC/SmartCity/DSS  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Maham Qayyum, Wajeeha Hamid, Munam Ali Shah |
Performance Analysis of Snort using Network Function Virtualization.  |
ICAC  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Luan N. Utimura, Kelton A. Costa |
Aplicação e Análise Comparativa do Desempenho de Classificadores de Padrões para o Sistema de Detecção de Intrusão Snort.  |
SBRC  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Sarvjot kaur Kang, Dale Lindskog, Hamman Samuel |
An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases.  |
TrustCom/BigDataSE  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Abdelsalam, Stefano Salsano, François Clad, Pablo Camarillo, Clarence Filsfils |
SR-Snort: IPv6 Segment Routing Aware IDS/IPS.  |
NFV-SDN  |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Imdadul Karim, Quoc-Tuan Vien, Tuan Anh Le 0002, Glenford Mapp |
A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks.  |
Comput.  |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Won Hyung Park, Seongjin Ahn |
Performance Comparison and Detection Analysis in Snort and Suricata Environment.  |
Wirel. Pers. Commun.  |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Syed Ali Raza Shah, Biju Issac 0001 |
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System.  |
CoRR  |
2017 |
DBLP BibTeX RDF |
|