Mukhopadhyay et al., 2011
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| AU2019216687B2 (en) | Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness | |
| Protić | Review of KDD Cup ‘99, NSL-KDD and Kyoto 2006+ datasets | |
| Pilli et al. | Network forensic frameworks: Survey and research challenges | |
| Ho et al. | Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems | |
| Thomas et al. | Usefulness of DARPA dataset for intrusion detection system evaluation | |
| Mukhopadhyay et al. | A comparative study of related technologies of intrusion detection & prevention systems | |
| Debar et al. | Intrusion detection: Introduction to intrusion detection and security information management | |
| Gupta et al. | Detecting attacks in high-speed networks: Issues and solutions | |
| CN113411295A (en) | Role-based access control situation awareness defense method and system | |
| Sainis et al. | Classification of various dataset for intrusion detection system | |
| Atri et al. | Optimization of Network Mapping for Screening and Intrusion Sensing Devices | |
| Jha et al. | Building agents for rule-based intrusion detection system | |
| Lazzez | A survey about network forensics tools | |
| KR100772177B1 (en) | Method and apparatus for generating intrusion detection event for security function test | |
| Resmi et al. | Intrusion detection system techniques and tools: A survey | |
| Iheagwara et al. | Evaluation of the performance of id systems in a switched and distributed environment: the realsecure case study | |
| Mukhopadhyay et al. | HawkEye solutions: a network intrusion detection system | |
| Altschaffel et al. | From the computer incident taxonomy to a computer forensic examination taxonomy | |
| Hajdarevic | Cyber Security Audit in Business Environments | |
| Nikhil | Real-Time Threat Detection: Suricata Log Analysis and Visualization for Network | |
| Al-Maani | Automatic modeling of cyber intrusions using the diamond model utilizing security logs and events | |
| Kalu et al. | Combining Host-based and network-based intrusion detection system: A cost effective tool for managing intrusion detection | |
| Janczewski | Handling distributed denial-of-service attacks | |
| Korhonen | Advanced Evasion Techniques: Measuring the threat detection capabilities of up-to-date network security devices | |
| Sørensen et al. | An Approach to Detect and Prevent Cybercrime in Large Complex Networks |