References in zbMATH (referenced in 25 articles )

Showing results 1 to 20 of 25.
Sorted by year (citations)

1 2 next

  1. Bul’ajoul, Waleed; James, Anne; Pannu, Mandeep: Improving network intrusion detection system performance through quality of service configuration and parallel technology (2015)
  2. Razzaq, Abdul; Latif, Khalid; Ahmad, H.Farooq; Hur, Ali; Anwar, Zahid; Bloodsworth, Peter Charles: Semantic security against web application attacks (2014)
  3. Shin, Seon-Ho; Im, Eun-Jin; Yoon, MyungKeun: A grand spread estimator using a graphics processing unit (2014)
  4. Xiong, Wei; Hu, Hanping; Xiong, Naixue; Yang, Laurence T.; Peng, Wen-Chih; Wang, Xiaofei; Qu, Yanzhen: Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications (2014)
  5. Gómez, J.; Gil, C.; Baños, R.; Márquez, A.L.; Montoya, F.G.; Montoya, M.G.: A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems (2013)
  6. Mitra, Mahasweta; Banerjee, Prithu; Barbhuiya, Ferdous A.; Biswas, Santosh; Nandi, Sukumar: IDS for ARP spoofing using LTL based discrete event system framework (2013)
  7. Shafi, Kamran; Abbass, Hussein A.: Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection (2013)
  8. Ippoliti, Dennis; Zhou, Xiaobo: A-GHSOM: an adaptive growing hierarchical self organizing map for network anomaly detection (2012)
  9. Lee, Sang Min; Kim, Dong Seong; Lee, Je Hak; Park, Jong Sou: Detection of DDos attacks using optimized traffic matrix (2012)
  10. Wu, Chengkun; Yin, Jianping; Cai, Zhiping; Zhu, En; Cheng, Jieren: An efficient pre-filtering mechanism for parallel intrusion detection based on many-core GPU (2010)
  11. Xue, Chun Jason; Liu, Meilin; Zhuge, Qingfeng; Sha, Edwin Hsing-Mean: Variable length pattern matching for hardware network intrusion detection system (2010)
  12. Zhang, Guangsen; Parashar, Manish: Cooperative detection and protection against network attacks using decentralized information sharing (2010)
  13. Song, Tian; Wang, Dongsheng; Tang, Zhizhong: A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention (2009)
  14. Alfaro, J.G.; Boulahia-Cuppens, N.; Cuppens, F.: Complete analysis of configuration rules to guarantee reliable network security policies (2008)
  15. Cheng, Guang; Gong, Jian; Ding, Wei; Wu, Hua; Qiang, Shiqiang: Adaptive sampling algorithm for detection of superpoints (2008)
  16. Greensmith, Julie; Feyereisl, Jan; Aickelin, Uwe: The DCA: SOMe comparison. A comparative study between two biologically inspired algorithms (2008)
  17. Nelson, Brent E.; Hutchings, Brad L.; Wirthlin, Michael J.: Design, debug, deploy: The creation of configurable computing applications (2008)
  18. Powers, Simon T.; He, Jun: A hybrid artificial immune system and Self Organising Map for network intrusion detection (2008)
  19. Sheu, Tzu-Fang; Huang, Nen-Fu; Lee, Hsiao-Ping: Hierarchical multi-pattern matching algorithm for network content inspection (2008)
  20. Ostaszewski, Marek; Seredynski, Franciszek; Bouvry, Pascal: Coevolutionary-based mechanisms for network anomaly detection (2007)

1 2 next