-
1
-
-
84897913321
-
A survey of emerging threats in cybersecurity
-
J. Jang-Jaccard, and S. Nepal A survey of emerging threats in cybersecurity J. Comput. Syst. Sci. 80 5 2014 973 993
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.5
, pp. 973-993
-
-
Jang-Jaccard, J.1
Nepal, S.2
-
2
-
-
27644509266
-
Intrusion detection systems and intrusion prevention systems
-
Accessed September 14, 2013
-
A. Fuchsberger Intrusion detection systems and intrusion prevention systems Inf. Secur. Tech. Rep. 10 2005 134 139 http://www.sciencedirect.com.lcproxy.shu.ac.uk/science/article/pii/S1363412705000415 Accessed September 14, 2013
-
(2005)
Inf. Secur. Tech. Rep.
, vol.10
, pp. 134-139
-
-
Fuchsberger, A.1
-
7
-
-
84893491705
-
Scalable high-performance parallel design for network intrusion detection systems on many-core processors
-
IEEE
-
H. Jiang, G. Zhang, G. Xie, K. Salamatian, L. Mathy, Scalable high-performance parallel design for network intrusion detection systems on many-core processors, in: Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systems, IEEE, pp. 137-146.
-
Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systems
, pp. 137-146
-
-
Jiang, H.1
Zhang, G.2
Xie, G.3
Salamatian, K.4
Mathy, L.5
-
9
-
-
83455235904
-
Current intrusion detection techniques in information technology - a detailed analysis
-
G.M. Nazer, and A.A.L. Selvakumar Current intrusion detection techniques in information technology - a detailed analysis Eur. J. Sci. Res. 65 2011 611 624
-
(2011)
Eur. J. Sci. Res.
, vol.65
, pp. 611-624
-
-
Nazer, G.M.1
Selvakumar, A.A.L.2
-
10
-
-
84862510240
-
Feasibility of intrusion detection system with high performance computing: a survey
-
S. Beg, U. Naru, M. Ashraf, and S. Moshin Feasibility of intrusion detection system with high performance computing: a survey Int. J. Adv. Comput. Sci. 1 2010 26 35
-
(2010)
Int. J. Adv. Comput. Sci.
, vol.1
, pp. 26-35
-
-
Beg, S.1
Naru, U.2
Ashraf, M.3
Moshin, S.4
-
12
-
-
34250315640
-
An overview of anomaly detection techniques: existing solutions and latest technological trends
-
A. Patcha, and J. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput. Netw. 51 2007 3448 3470
-
(2007)
Comput. Netw.
, vol.51
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.2
-
13
-
-
19944424800
-
Real-time intrusion detection for high-speed networks
-
W. Jiang, H. Song, and Y. Dai Real-time intrusion detection for high-speed networks Comput. Secur. 24 2005 287 294
-
(2005)
Comput. Secur.
, vol.24
, pp. 287-294
-
-
Jiang, W.1
Song, H.2
Dai, Y.3
-
14
-
-
84861492152
-
A study of methodologies used in intrusion detection and prevention system (IDPS)
-
D. Mudzingwa, and R. Agrawal A study of methodologies used in intrusion detection and prevention system (IDPS) Proceedings of IEEE Southeastcon 2012 1 6
-
(2012)
Proceedings of IEEE Southeastcon
, pp. 1-6
-
-
Mudzingwa, D.1
Agrawal, R.2
-
15
-
-
84928289743
-
-
Accessed July 17
-
Cisco Systems Cisco ASA 5585-X adaptive security appliance n.d. http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/product-data-sheet0900aecd802930c5.html 2014 Accessed July 17
-
(2014)
Cisco ASA 5585-X adaptive security appliance
-
-
Systems, C.1
-
16
-
-
85006406611
-
-
Intrusion Assurance Technology Analysis Center, Herndon, VA sixth ed. 2009 Accessed September 15, 2013
-
T.M. Wu Intrusion Detection Systems Intrusion Assurance Technology Analysis Center, Herndon, VA sixth ed. 2009 http://iac.dtic.mil/csiac/download/intrusion-detection.pdf 2009 Accessed September 15, 2013
-
(2009)
Intrusion Detection Systems
-
-
Wu, T.M.1
-
18
-
-
84871900133
-
An implementation of intrusion detection system using genetic algorithm
-
M.S. Hoque, M.A. Mukit, and M.A. Bikas An implementation of intrusion detection system using genetic algorithm Int. J. Netw. Secur. Appl. IV 2012 111 112
-
(2012)
Int. J. Netw. Secur. Appl.
, vol.4
, pp. 111-112
-
-
Hoque, M.S.1
Mukit, M.A.2
Bikas, M.A.3
-
23
-
-
50649101834
-
-
Accessed October 20
-
Cisco Systems Quality of service design overview n.d. http://www.cisco.com/en/US/docs/solutions/Enterprise/WAN-and-MAN/QoS-SRND/QoSIntro.html 2013 Accessed October 20
-
(2013)
Quality of service design overview
-
-
Systems, C.1
-
26
-
-
84869475315
-
A highly-scalable software-based intrusion detection system
-
ACM
-
M. Jamshed, J. Lee, S. Moon, I. Yun, D. Kim, S. Lee, Y. Yi, and K.S. Park Kargus A highly-scalable software-based intrusion detection system Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012 ACM 317 328
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 317-328
-
-
Jamshed, M.1
Lee, J.2
Moon, S.3
Yun, I.4
Kim, D.5
Lee, S.6
Yi, Y.7
Park Kargus, K.S.8
-
28
-
-
84919964294
-
A brief study and comparison of Snort and Bro Open source network intrusion detection system
-
P. Mehra A brief study and comparison of Snort and Bro Open source network intrusion detection system Int. J. Adv. Res. Comput. Commun. Eng. 1 6 2012 383 386
-
(2012)
Int. J. Adv. Res. Comput. Commun. Eng.
, vol.1
, Issue.6
, pp. 383-386
-
-
Mehra, P.1
-
29
-
-
57349136699
-
Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme
-
K. Salah, and A. Qahtan Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme Comput. Commun. 32 1 2009 179 188
-
(2009)
Comput. Commun.
, vol.32
, Issue.1
, pp. 179-188
-
-
Salah, K.1
Qahtan, A.2
-
33
-
-
84869475315
-
Kargus: a highly-scalable software-based intrusion detection system
-
M. Jamshed, J. Lee, S. Moon, I. Yun, D. Kim, S. Lee, Y. Yi, and K. Park Kargus: a highly-scalable software-based intrusion detection system Proceedings of the ACM Conference on Computer and Communications Security CCS 2012
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security CCS
-
-
Jamshed, M.1
Lee, J.2
Moon, S.3
Yun, I.4
Kim, D.5
Lee, S.6
Yi, Y.7
Park, K.8
-
34
-
-
84897913831
-
A security framework in G-Hadoop for big data computing across distributed Cloud data centres
-
J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kolodziej, A. Streit, and D. Georgakopoulos A security framework in G-Hadoop for big data computing across distributed Cloud data centres J. Comput. Syst. Sci. 80 5 2014 994 1007
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.5
, pp. 994-1007
-
-
Zhao, J.1
Wang, L.2
Tao, J.3
Chen, J.4
Sun, W.5
Ranjan, R.6
Kolodziej, J.7
Streit, A.8
Georgakopoulos, D.9
-
35
-
-
84897916695
-
Internet traffic clustering with side information
-
Y. Wang, Y. Xiang, J. Zhang, W. Zhou, and B. Xie Internet traffic clustering with side information J. Comput. Syst. Sci. 80 5 2014 1021 1036
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.5
, pp. 1021-1036
-
-
Wang, Y.1
Xiang, Y.2
Zhang, J.3
Zhou, W.4
Xie, B.5
|