Johnson et al., 2016
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US12192170B2 (en) | System and method for implementing content and network security inside a chip | |
| US9832227B2 (en) | System and method for network level protection against malicious software | |
| Caswell et al. | Snort intrusion detection and prevention toolkit | |
| US6684329B1 (en) | System and method for increasing the resiliency of firewall systems | |
| ES2768049T3 (en) | Procedures and systems to secure and protect repositories and directories | |
| Dutta et al. | Intrusion detection systems fundamentals | |
| Johnson et al. | Studying naïve users and the insider threat with SimpleFlow | |
| Monteiro | How intrusion detection can improve software decoy applications | |
| Mirabella et al. | A Portable Research Honeypot for Corporate Networks | |
| Sharma et al. | STADS: security threats assessment and diagnostic system in software defined networking (SDN) | |
| Alharkan | IDSaaS: Intrusion Detection system as a Service in public clouds | |
| Schmitt | A Framework for Cyber Vulnerability Assessments of InfiniBand Networks | |
| Alshaya | Software-Defined Networking Security Techniques and the Digital Forensics of the SDN Control Plane | |
| Shockley et al. | Using VisorFlow to control information flow without modifying the operating system Kernel or its Userspace | |
| Kalil | Policy Creation and Bootstrapping System for Customer Edge Switching | |
| Uusiheimala | Advanced threat detection through Snort integration: a study of IDS/IPS implementation at an institute of higher education | |
| Lei | Building Infrastructure Support for Organizational Security: An Approach to Network | |
| CN120223446A (en) | Intrusion security detection methods, devices, equipment, media and program products | |
| Roth | Developing of a methodology for evaluation of targeted cyber attacks using exploits on ARM-based Industrial IoT devices | |
| Bakos et al. | Ubiquitous Redirection as Access Control Response. | |
| Mohamed Kher | Internet Home Security | |
| Clayton | Network Attack and Defence | |
| MARTYKÁN | VIRTUALIZED ENVI RON MENT FOR ANALYSIS OF MALWARE TRAFFIC | |
| Tufts | Network Based Malware Defense | |
| Dhoot | DEVELOPING A LOW COST SOLUTION FOR ENTERPRISE SECURITY |