Snort
From MaRDI portal
Software:26052
No author found.
Related Items (16)
A scalable intrusion detection system for IPv6 ⋮ Two alternatives for handling preferences in qualitative choice logic ⋮ Privacy-preserving pattern matching on encrypted data ⋮ Revisiting multiple pattern matching algorithms for multi-core architecture ⋮ On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems ⋮ A model of the behavior of network objects in distributed computer systems ⋮ MULAN: Multi-Level Adaptive Network Filter ⋮ An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU ⋮ Coevolutionary-based mechanisms for network anomaly detection ⋮ A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention ⋮ Using data-independence in the analysis of intrusion detection systems ⋮ Principle components and importance ranking of distributed anomalies ⋮ A faster algorithm for matching a set of patterns with variable length don't cares ⋮ Compressing Regular Expressions’ DFA Table by Matrix Decomposition ⋮ Indices of Power in Optimal IDS Default Configuration: Theory and Examples ⋮ Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA
This page was built for software: Snort