|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 40 occurrences of 23 keywords
|
|
|
Results
Found 40 publication records. Showing 40 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
NIDSs, Policy Anomalies, Network Security, Firewalls |
53 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Analysis of Policy Anomalies on Distributed Network Security Setups. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Tomás E. Uribe, Steven Cheung |
Automatic analysis of firewall and network intrusion detection system configurations. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
formal specification and analysis, network configuration and security, firewalls, network intrusion detection |
37 | Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro |
Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features. |
Log. J. IGPL |
2024 |
DBLP DOI BibTeX RDF |
|
37 | Minxiao Wang, Ning Yang 0009, Ning Weng |
Exploring the Impact of Early Detection on DL-Based NIDSs Models. |
UEMCON |
2023 |
DBLP DOI BibTeX RDF |
|
37 | Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang 0001, Shuqiang Lu, Xingang Shi, Xia Yin |
Practical Traffic-space Adversarial Attacks on Learning-based NIDSs. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
37 | Mohammad J. Hashemi, Greg Cusack, Eric Keller |
Towards Evaluation of NIDSs in Adversarial Setting. |
Big-DAMA@CoNEXT |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Anna Giannakou, Louis Rilling, Christine Morin, Jean-Louis Pazat |
Automatic Reconfiguration of NIDSs in IaaS Clouds with SAIDS. |
CloudCom |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim |
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Abhishek Das, David Nguyen, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary |
An FPGA-Based Network Intrusion Detection Architecture. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Abhishek Das, Sanchit Misra, Sumeet Joshi, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary |
An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Chia-Tien Dan Lo, Yi-Gang Tai |
Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs. |
ARC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin |
A real-time network intrusion detection system based on incremental mining approach. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Byoung-Koo Kim, Seungyong Yoon, Jintae Oh |
ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
header lookup, intrusion detection, pattern matching |
35 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
A Stateful Real Time Intrusion Detection System for high-speed network. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jiong Zhang, Mohammad Zulkernine |
A Hybrid Network Intrusion Detection Technique Using Random Forests. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Hybrid detection, Data mining, Intrusion detection, Network security, Random forests |
35 | Makoto Shimamura, Kenji Kono |
Using Attack Information to Reduce False Positives in Network IDS. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Michael G. Merideth, Priya Narasimhan |
Elephant: Network Intrusion Detection Systems that Don't Forget. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Robin Sommer, Vern Paxson |
Exploiting Independent State For Network Intrusion Detection. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao |
A fast string-matching algorithm for network processor-based intrusion detection system. |
ACM Trans. Embed. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
network, Intrusion detection, pattern matching, processor |
35 | Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang |
Design and Implementation of High-Performance Intrusion Detection System. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Hoang Le, Yi-Hua E. Yang, Viktor K. Prasanna |
Memory efficient string matching: a modular approach on FPGAs (abstract only). |
FPGA |
2010 |
DBLP DOI BibTeX RDF |
deep packet classification, fpga, packet filtering |
18 | Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani |
Evaluating Intrusion Detection Systems in High Speed Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi |
A scalable multi-core aware software architecture for high-performance network monitoring. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
high-performance network monitoring, multi-core aware architecture, scalable architecture |
18 | Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens |
Complete analysis of configuration rules to guarantee reliable network security policies. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Policy anomalies, Network security, Intrusion Detection systems, Firewalls |
18 | Chia-Tien Dan Lo, Yi-Gang Tai, Kleanthis Psarris |
Hardware implementation for network intrusion detection rules with regular expression support. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
security, FPGAs, intrusion detection, network intrusion detection system |
18 | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer |
Predicting the resource consumption of network intrusion detection systems. |
SIGMETRICS |
2008 |
DBLP DOI BibTeX RDF |
performance model, NIDS |
18 | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer |
Predicting the Resource Consumption of Network Intrusion Detection Systems. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson |
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jie Ma, Zhitang Li, Weiming Li |
Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop |
Modeling network intrusion detection alerts for correlation. |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
alert fusion, intrusion detection, capability, Alert correlation |
18 | Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch |
A Traffic Classification Algorithm for Intrusion Detection. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Zhiwen Zhang, Mingtian Zhou |
A Code-Based Multi-match Packet Classification with TCAM. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
Code-based, Multi-match Packet Classification, TCAM, NIDS |
18 | David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins |
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
18 | José M. González, Vern Paxson |
Enhancing Network Intrusion Detection with Integrated Sampling and Filtering. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Janardhan Singaraju, Long Bu, John A. Chandy |
A Signature Match Processor Architecture for Network Intrusion Detection. |
FCCM |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer |
Operational experiences with high-volume network intrusion detection. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, network intrusion detection |
18 | Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li |
A Parallel Intrusion Detection System for High-Speed Networks. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Robin Sommer, Vern Paxson |
Enhancing byte-level network intrusion detection signatures with context. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort |
18 | Shaomeng Li, Jim Tørresen, Oddvar Søråsen |
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware. |
FPL |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #40 of 40 (100 per page; Change: )
|
|