-
1
-
-
85027579558
-
-
[Accessed: 22-Oct.-2016]
-
"Suricata IDS". [Online]. Available: https://suricata-ids.org/. [Accessed: 22-Oct.-2016].
-
-
-
-
3
-
-
84973111531
-
A survey of security issues for cloud computing
-
M. A. Khan, "A survey of security issues for cloud computing", Journal of Network and Computer Applications, vol. 71, pp. 11-29, 2016.
-
(2016)
Journal of Network and Computer Applications
, vol.71
, pp. 11-29
-
-
Khan, M.A.1
-
6
-
-
84947804398
-
Design and analysis of an enhanced secure mechanism of llrp in RFID systems
-
B. Cui, Z. Wang, J. Yang, and X. Chen, "Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems", in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, 2015, pp. 17-21.
-
(2015)
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops
, pp. 17-21
-
-
Cui, B.1
Wang, Z.2
Yang, J.3
Chen, X.4
-
7
-
-
85000402215
-
Ensuring the visibility and traceability of items through logistics chain of automotive industry based on autoepcnet using
-
Nov
-
P. Stasa, F. Benes, J. Svub, Y.-S. Kang, J. Unucka, L. Vojtech, V. Kebo, and J. Rhee, "Ensuring the Visibility and Traceability of Items through Logistics Chain of Automotive Industry Based on AutoEPCNet Using", Advances in Electrical and Electronic Engineering, vol. 14, no. 4, p.-, Nov. 2016.
-
(2016)
Advances in Electrical and Electronic Engineering
, vol.14
, Issue.4
-
-
Stasa, P.1
Benes, F.2
Svub, J.3
Kang, Y.-S.4
Unucka, J.5
Vojtech, L.6
Kebo, V.7
Rhee, J.8
-
8
-
-
84943578795
-
Auto-ID for automotive industry
-
P. Stasa, F. Benes, J. Svub, V. Kebo, and J. Unucka, "Auto-ID for automotive industry", in Proceedings of the 2015 16th International Carpathian Control Conference (ICCC), 2015, pp. 501-506.
-
(2015)
Proceedings of the 2015 16th International Carpathian Control Conference (ICCC)
, pp. 501-506
-
-
Stasa, P.1
Benes, F.2
Svub, J.3
Kebo, V.4
Unucka, J.5
-
9
-
-
84943573343
-
Security of ONS service for applications of the Internet of Things and their pilot implementation in academic network
-
L. Kypus, L. Vojtech, and J. Hrad, "Security of ONS service for applications of the Internet of Things and their pilot implementation in academic network", in Proceedings of the 2015 16th International Carpathian Control Conference (ICCC), 2015, pp. 271-276.
-
(2015)
Proceedings of the 2015 16th International Carpathian Control Conference (ICCC)
, pp. 271-276
-
-
Kypus, L.1
Vojtech, L.2
Hrad, J.3
-
10
-
-
84893353653
-
Monitoring of RFID failures resulting from LLRP misconfigurations
-
R. Kheddam, O.-E.-K. Aktouf, I. Parissis, and S. Boughazi, "Monitoring of RFID failures resulting from LLRP misconfigurations", in 2013 21st International Conference on Software, Telecommunications and Computer Networks-(SoftCOM 2013), 2013, pp. 1-6.
-
(2013)
2013 21st International Conference on Software, Telecommunications and Computer Networks-(SoftCOM 2013)
, pp. 1-6
-
-
Kheddam, R.1
Aktouf, O.-E.-K.2
Parissis, I.3
Boughazi, S.4
-
11
-
-
85027543296
-
-
Acarm-ng Acarm-ng[Accessed: 28-Dec.-2016]
-
"Acarm-ng", Acarm-ng. [Online]. Available: http://www.acarm.wcss.wroc.pl/index.php. [Accessed: 28-Dec.-2016].
-
-
-
-
12
-
-
84870952509
-
-
[Accessed: 24-Dec.-2016]
-
"The Bro Network Security Monitor". [Online]. Available: https://www.bro.org. [Accessed: 24-Dec.-2016].
-
The Bro Network Security Monitor
-
-
-
13
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time", Journal Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 31, no. 23-24, pp. 2435-2463, 1999.
-
(1999)
Journal Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
14
-
-
85027578939
-
-
EXpert-BSM. [Accessed: 18-Oct.-2016]
-
"EXpert-BSM", EXpert-BSM. [Online]. Available: http://www.csl.sri.com/projects/emerald/releases/eXpert-BSM/. [Accessed: 18-Oct.-2016].
-
-
-
-
16
-
-
85027580922
-
-
Fail2ban [Accessed: 20-Oct.-2016]
-
"Fail2ban", Fail2ban. [Online]. Available: http://www.fail2ban.org/wiki/index.php/MANUAL-0-8. [Accessed: 20-Oct.-2016].
-
-
-
-
17
-
-
85027579446
-
-
OSSEC[Accessed: 21-Oct.-2016]
-
"OSSEC", OSSEC. [Online]. Available: http://ossec.github.io/. [Accessed: 21-Oct.-2016].
-
-
-
-
18
-
-
85027589974
-
-
Prelude OSS [Accessed: 21-Oct.-2016]
-
"Prelude OSS", Prelude OSS. [Online]. Available: http://www.preludesiem. com/en/products/prelude-oss/. [Accessed: 21-Oct.-2016].
-
-
-
-
19
-
-
84928120600
-
-
THE SAGAN LOG ANALYSIS ENGINE. [Accessed: 22-Oct.-2016]
-
"THE SAGAN LOG ANALYSIS ENGINE", QUADRANT Information Security. [Online]. Available: https://quadrantsec.com/sagan-log-analysis-engine/. [Accessed: 22-Oct.-2016].
-
QUADRANT Information Security
-
-
-
20
-
-
85027578891
-
-
Samhain Labs[Accessed: 22-Oct.-2016]
-
"Samhain", Samhain Labs. [Online]. Available: http://www.lasamhna. de/samhain/.[Accessed: 22-Oct.-2016].
-
-
-
-
21
-
-
85027587091
-
-
[Accessed: 23-Oct.-2016]
-
"SNORT". [Online]. Available: https://www.snort.org. [Accessed: 23-Oct.-2016].
-
-
-
|