Jha et al., 2002
| Publication | Publication Date | Title |
|---|---|---|
| Binde et al. | Assessing outbound traffic to uncover advanced persistent threat | |
| US9942270B2 (en) | Database deception in directory services | |
| Caswell et al. | Snort intrusion detection and prevention toolkit | |
| US9769204B2 (en) | Distributed system for Bot detection | |
| US20190020667A1 (en) | Non-rule based security risk detection | |
| Albin | A comparative analysis of the snort and suricata intrusion-detection systems | |
| Kurundkar et al. | Network intrusion detection using Snort | |
| Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
| Hiesgen et al. | The Log4j incident: a comprehensive measurement study of a critical vulnerability | |
| Srivatsa | Detecting and preventing attacks using network intrusion detection systems | |
| Jha et al. | Building agents for rule-based intrusion detection system | |
| Sayyed et al. | Intrusion detection system | |
| Mai et al. | J-Honeypot: a Java-based network deception tool with monitoring and intrusion detection | |
| Adiwal et al. | Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection | |
| Resmi et al. | Intrusion detection system techniques and tools: A survey | |
| Sommestad et al. | A test of intrusion alert filtering based on network information | |
| Iheagwara et al. | Evaluation of the performance of id systems in a switched and distributed environment: the realsecure case study | |
| Navin et al. | A survey on intrusion detection system | |
| Ramakrishnan et al. | Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring | |
| Fanfara et al. | Autonomous hybrid honeypot as the future of distributed computer systems security | |
| Verwoerd | Active network security | |
| Kaur et al. | Intrusion detection system using honeypots and swarm intelligence | |
| Karthikeyan et al. | NETWORK INTRUSION DETECTION SYSTEM BASED ON PACKET FILTERS. | |
| Larsen | Slow port scanning with bro | |
| Mukhopadhyay et al. | HawkEye solutions: a network intrusion detection system |