Uusiheimala, 2025
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Caswell et al. | Snort intrusion detection and prevention toolkit | |
| Agarwal et al. | A closer look at intrusion detection system for web applications | |
| Sharma et al. | Analysis of security data from a large computing organization | |
| EP2432188B1 (en) | Systems and methods for processing data flows | |
| US7979368B2 (en) | Systems and methods for processing data flows | |
| US8010469B2 (en) | Systems and methods for processing data flows | |
| US20080229415A1 (en) | Systems and methods for processing data flows | |
| US20110231510A1 (en) | Processing data flows with a data flow processor | |
| US20110219035A1 (en) | Database security via data flow processing | |
| US20110214157A1 (en) | Securing a network with data flow processing | |
| US20110238855A1 (en) | Processing data flows with a data flow processor | |
| US20110231564A1 (en) | Processing data flows with a data flow processor | |
| US20110213869A1 (en) | Processing data flows with a data flow processor | |
| US20080134330A1 (en) | Systems and methods for processing data flows | |
| US20120240185A1 (en) | Systems and methods for processing data flows | |
| Hindy et al. | A taxonomy of malicious traffic for intrusion detection systems | |
| Scarfone et al. | Intrusion detection and prevention systems | |
| Khari et al. | Meticulous study of firewall using security detection tools | |
| Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
| Diebold et al. | A honeypot architecture for detecting and analyzing unknown network attacks | |
| Czekster et al. | Requirements for designing mobile and flexible applications for online invasion detection and remote control | |
| Uusiheimala | Advanced threat detection through Snort integration: a study of IDS/IPS implementation at an institute of higher education | |
| Monteiro | How intrusion detection can improve software decoy applications | |
| Pasha | A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company | |
| Bezborodov | Intrusion Detection Systems and Intrusion Prevention System with Snort provided by Security Onion. |