Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
141 | Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan |
Compiling PCRE to FPGA for accelerating SNORT IDS. |
ANCS |
2007 |
DBLP DOI BibTeX RDF |
deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions |
92 | Pravesh Gaonjur, N. Z. Tarapore, S. G. Pukale, M. L. Dhore |
Using Neuro-Fuzzy Techniques to reduce false alerts in IDS. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
88 | Kai Hwang 0001, Min Cai, Ying Chen, Min Qin |
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation |
79 | Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan |
Integrating software specifications into intrusion detection. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Software specification languages, Intrusion detection, State machines, Attack scenarios |
79 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector. |
PST |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
71 | Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez |
Design of a Snort-Based Hybrid Intrusion Detection System. |
IWANN (2) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, Intrusion detection systems, Snort, Network IDS |
71 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
True positive, DARPA dataset, Intrusion Detection System, False positive, Snort |
71 | Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour |
RAAS: a reliable analyzer and archiver for snort intrusion detection system. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
IDS analyzer, intrusion detection system, archiving, snort |
62 | Barry Irwin, Jean-Pierre van Riel |
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope. |
VizSEC |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Michael Attig, John W. Lockwood |
SIFT: Snort Intrusion Filter for TCP. |
Hot Interconnects |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Richard A. Henders, Bill Opdyke |
Detecting intruders on a campus network: might the threat be coming from within? |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, snort |
62 | Pedro Alípio, Paulo Carvalho 0002, José Neves 0001 |
Using CLIPS to Detect Network Intrusions. |
EPIA |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, CLIPS, SNORT, attack scenarios, certainty factors |
52 | Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios |
Adaptabilty of a GP Based IDS on Wireless Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service |
52 | Sushant Sinha, Farnam Jahanian, Jignesh M. Patel |
WIND: Workload-Aware INtrusion Detection. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention |
49 | Shahrulniza Musa, David J. Parish |
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
alert visualization, network security information visualization, alert classification, machine learning |
48 | Robin Sommer, Vern Paxson |
Enhancing byte-level network intrusion detection signatures with context. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort |
45 | Chad A. Arney, Xinli Wang |
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
45 | Angela Orebaugh, Simon Biles, Jacob Babbin |
Snort cookbook - solutions and examples for Snort administrators. |
|
2005 |
RDF |
|
45 | Raghavan Muthuregunathan, S. Siddharth, R. Srivathsan, S. R. Rajesh |
Efficient Snort Rule Generation Using Evolutionary Computing for Network Intrusion Detection. |
CICSyN |
2009 |
DBLP DOI BibTeX RDF |
Genetic Algorithm, Clustering, parallel Computing, Grid, Network Intrusion Detection, Hill Climbing, Snort |
45 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
Investigating the problem of IDS false alarms: An experimental study using Snort. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection System, Snort, False Alarm |
39 | Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani |
Evaluating Intrusion Detection Systems in High Speed Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Derek L. Schuff, Vijay S. Pai |
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Chi-Hung Chi, Ming Li 0002, Dongxi Liu |
A Method to Obtain Signatures from Honeypots Data. |
NPC |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz |
Systematic Signature Engineering by Re-use of Snort Signatures. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jorge Herrerías Guerrero, Roberto Gómez Cárdenas |
An example of communication between security tools: iptables - snort. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
Linux |
35 | Wojciech Tylman |
Detecting Computer Intrusions with Bayesian Networks. |
IDEAL |
2009 |
DBLP DOI BibTeX RDF |
Metasploit Framework, Bayesian networks, network intrusion detection, Snort |
35 | Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung |
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, pattern matching, processor array, Snort |
35 | Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai |
Conservative vs. optimistic parallelization of stateful network intrusion detection. |
PPoPP |
2007 |
DBLP DOI BibTeX RDF |
parallelization, snort |
35 | Larry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick |
A GUI for intrusion detection and related experiences. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, snort, NIDS |
35 | Young H. Cho, William H. Mangione-Smith |
A pattern matching coprocessor for network security. |
DAC |
2005 |
DBLP DOI BibTeX RDF |
network security, pattern matching, intrusion, snort, pattern search |
26 | Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos |
Improving the accuracy of network intrusion detection systems under load using selective packet discarding. |
EUROSEC |
2010 |
DBLP DOI BibTeX RDF |
selective packet discarding, intrusion detection, overload control |
26 | Alok Tongaonkar, R. Sekar 0001, Sreenaath Vasudevan |
Fast Packet Classification Using Condition Factorization. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, Andrea J. Cullen, John Mellor, Pravin Mirchandani |
Virtualization in Network Intrusion Detection Systems. |
OTM Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Wei Lu 0018, Hengjian Tong |
Detecting Network Anomalies Using CUSUM and EM Clustering. |
ISICA |
2009 |
DBLP DOI BibTeX RDF |
clustering, Intrusion detection |
26 | Weirong Jiang, Viktor K. Prasanna |
Field-split parallel architecture for high performance multi-match packet classification using FPGAs. |
SPAA |
2009 |
DBLP DOI BibTeX RDF |
multi-match packet classification, fpga, sram, nids |
26 | Young H. Cho, William H. Mangione-Smith |
Deep network packet filter design for reconfigurable devices. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
string filter, Firewall, worm, network intrusion detection, virus |
26 | Ying Yu, Raymond R. Hoare, Alex K. Jones |
A CAM-based intrusion detection system for single-packet attack detection. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis |
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
parallel programming, network security, GPU, pattern matching, intrusion detection systems, SIMD |
26 | Tian Song, Wei Zhang, Dongsheng Wang 0002, Yibo Xue |
A Memory Efficient Multiple Pattern Matching Architecture for Network Security. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Atsushi Yoshioka, Shariful Hasan Shaikot, Min Sik Kim |
Rule Hashing for Efficient Packet Classification in Network Intrusion Detection. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franzon |
Hardware Architecture of a Parallel Pattern Matching Engine. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Eduardo Mosqueira-Rey, Amparo Alonso-Betanzos, Belén Baldonedo del Río, Jesús Lago Piñeiro |
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Shai Rubin, Somesh Jha, Barton P. Miller |
Protomatching network traffic for high throughputnetwork intrusion detection. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, signatures, protocol analysis |
26 | Dionisios N. Pnevmatikatos, Aggelos Arelakis |
Variable-Length Hashing for Exact Pattern Matching. |
FPL |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi |
A Method of Generating Highly Efficient String Matching Circuit for Intrusion Detection. |
FPL |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Toshihiro Katashita, Atusi Maeda, Kenji Toda, Yoshinori Yamaguchi |
Highly Efficient String Matching Circuit for IDS with FPGA. |
FCCM |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis |
Packet pre-filtering for network intrusion detection. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
packet inspection, packet pre-filtering, intrusion detection |
26 | Michael Attig, John W. Lockwood |
A framework for rule processing in reconfigurable network systems (abstract only). |
FPGA |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Kai Hwang 0001, Ying Chen, Hua Liu |
Defending Distributed Systems Against Malicious Intrusions and Network Anomalies. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael Attig, John W. Lockwood |
A Framework for Rule Processing in Reconfigurable Network Systems. |
FCCM |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael G. Merideth, Priya Narasimhan |
Elephant: Network Intrusion Detection Systems that Don't Forget. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jingmin Zhou, Adam J. Carlson, Matt Bishop |
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao |
A fast string-matching algorithm for network processor-based intrusion detection system. |
ACM Trans. Embed. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
network, Intrusion detection, pattern matching, processor |
26 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics Part I: Analyzing the Network. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
blackhat, honeypots, honeynets |
26 | Ioannis Sourdis, Dionisios N. Pnevmatikatos |
Pre-Decoded CAMs for Efficient and High-Speed NIDS Pattern Matching. |
FCCM |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Shai Rubin, Somesh Jha, Barton P. Miller |
Automatic Generation and Analysis of NIDS Attacks. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Christopher R. Clark, David E. Schimmel |
Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns. |
FPL |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
26 | Maya B. Gokhale, Dave Dubois, Andy Dubois, Mike Boorman, Steve Poole 0001, Vic Hogsett |
Granidt: Towards Gigabit Rate Network Intrusion Detection Technology. |
FPL |
2002 |
DBLP DOI BibTeX RDF |
|
23 | N. D. Patel, B. M. Mehtre, Rajeev Wankar |
A Snort-based secure edge router for smart home. |
Int. J. Sens. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kashif Ishaq, Hafiz Ahsan Javed |
Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Chin-Ling Chen, Jian Lin Lai |
An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yi-Cheng Lai, Chiao-Lin Yu, Man-Ling Liao, Yu-Shan Lin, Yao-Chung Chang, Jiann-Liang Chen |
An Intelligence Defense System with SNORT Rules. |
ICACT |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ouafae Elaeraj, Cherkaoui Leghris |
Study of the SNORT intrusion detection system based on machine learning. |
CiSt |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac, Radu Tarabuta |
Distributed Firewall Traffic Filtering and Intrusion Detection Using Snort on pfSense Firewalls with Random Forest Classification. |
TSP |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Sarah Abdulrezzak, Firas A. Sabir |
Enhancing Intrusion Prevention in Snort System. |
DeSE |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Abdul Waleed, Abdul Fareed Jamali, Ammar Masood |
Which open-source IDS? Snort, Suricata or Zeek. |
Comput. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ebrima Jaw, Xueming Wang |
A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC). |
PeerJ Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori, Kalamullah Ramli |
The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data. |
Big Data Cogn. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Felix Erlacher, Falko Dressler |
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. |
IEEE Trans. Dependable Secur. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz |
Configuration vulnerability in SNORT for Windows Operating Systems. |
CSR |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Fahmida Rafa, Zinnet Rahman, Md Mahbub Mishu, Morad Hasan, Raiyan Rahman, Dip Nandi |
Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security. |
ICCA |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac |
Network Congestion Solution for FTP Services Based on Distributed Firewall and Snort. |
RoEduNet |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sumit Badotra, Surya Narayan Panda |
SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. |
Clust. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jos W. H. M. Uiterwijk |
Solving Bicoloring-Graph Games on Rectangular Boards - Part 1: Partisan Col and Snort. |
ACG |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jos W. H. M. Uiterwijk |
Solving Bicoloring-Graph Games on Rectangular Boards - Part 2: Impartial Col and Snort. |
ACG |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Kohei Masumi, Chansu Han, Tao Ban, Takeshi Takahashi 0001 |
Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. |
CODASPY |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Bo Dai 0007, Zhenhai Zhang, Ling Wang, Yuan Liu |
APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow. |
SmartCom |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Ilayda Gündoüdu, Ali Aydin Selçuk, Süleyman Özarslan |
Effectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection System. |
SIU |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Alka Gupta, Lalit Sen Sharma |
A categorical survey of state-of-the-art intrusion detection system-Snort. |
Int. J. Inf. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Igor V. Kotenko, Nikolay Komashinsky |
Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. |
SIN |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Assadarat Khurat, Wudhichart Sawangphol |
An Ontology for SNORT Rule. |
JCSSE |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal |
Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN. |
SKIMA |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Mondher Essid, Farah Jemili, Ouajdi Korbaa |
Distributed Architecture of Snort IDS in Cloud Environment. |
ISDA |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Nilesh Kunhare, Ritu Tiwari, Joydip Dhar |
Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks. |
HIS |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Chenxi Li, Jiahai Yang 0001, Guo Li, Kang Wang |
A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher. |
LCN Symposium |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Emre Erturk, Mayank Kumar |
New Use Cases for Snort: Cloud and Mobile Environments. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
23 | Dmitrii Kuvaiskii, Somnath Chakrabarti, Mona Vij |
Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX). |
CoRR |
2018 |
DBLP BibTeX RDF |
|
23 | Syed Ali Raza Shah, Biju Issac 0001 |
Performance comparison of intrusion detection systems and application of machine learning to Snort system. |
Future Gener. Comput. Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Xibin Sun, Du Zhang, Mingzhe Liu, Zhuoxin He, Haijie Li, Jiwei Li |
Detecting and Resolving Inconsistencies in Snort. |
ICCI*CC |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ban Mohammed Khammas, Sami Hasan, Rabah Abood Ahmed, Joseph Stephen Bassi, Ismahani Binti Ismail |
Accuracy Improved Malware Detection Method using Snort Sub-signatures and Machine Learning Techniques. |
CEEC |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal |
Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks. |
HPCC/SmartCity/DSS |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Maham Qayyum, Wajeeha Hamid, Munam Ali Shah |
Performance Analysis of Snort using Network Function Virtualization. |
ICAC |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Luan N. Utimura, Kelton A. Costa |
Aplicação e Análise Comparativa do Desempenho de Classificadores de Padrões para o Sistema de Detecção de Intrusão Snort. |
SBRC |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Sarvjot kaur Kang, Dale Lindskog, Hamman Samuel |
An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases. |
TrustCom/BigDataSE |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Abdelsalam, Stefano Salsano, François Clad, Pablo Camarillo, Clarence Filsfils |
SR-Snort: IPv6 Segment Routing Aware IDS/IPS. |
NFV-SDN |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Imdadul Karim, Quoc-Tuan Vien, Tuan Anh Le 0002, Glenford Mapp |
A Comparative Experimental Design and Performance Analysis of Snort-Based Intrusion Detection System in Practical Computer Networks. |
Comput. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Won Hyung Park, Seongjin Ahn |
Performance Comparison and Detection Analysis in Snort and Suricata Environment. |
Wirel. Pers. Commun. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Syed Ali Raza Shah, Biju Issac 0001 |
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System. |
CoRR |
2017 |
DBLP BibTeX RDF |
|