Intrusion prevention systems: superior security

被引:1
|
作者
Rowan, Tom [1 ]
机构
[1] Magirus
关键词
Intrusion detection;
D O I
10.1016/S1353-4858(07)70082-X
中图分类号
学科分类号
摘要
引用
收藏
页码:11 / 15
相关论文
共 50 条
  • [1] Security configuration management in Intrusion Detection and Prevention Systems
    Alsubhi, K.
    Alhazmi, Y.
    Bouabdallah, N.
    Boutaba, R.
    [J]. International Journal of Security and Networks, 2012, 7 (01) : 30 - 39
  • [2] Intrusion Detection and Prevention Systems (IDPS) and Security Issues
    Sharifi, A. Ahmad
    Noorollahi, B. Akram
    Farokhmanesh, Farnoosh
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (11): : 80 - 84
  • [3] A security policy and Network Cartography based Intrusion Detection and Prevention Systems
    Meharouech, Sourour
    Bouhoula, Adel
    Abbes, Tarek
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
  • [4] Security Implications of Network Address Translation on Intrusion Detection and Prevention Systems
    Sourour, Meharouech
    Adel, Bouhoula
    Tarek, Abbes
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 1 - 5
  • [5] Strengthening Network Security: Evaluation of Intrusion Detection and Prevention Systems Tools in Networking Systems
    Prabowo, Wahyu Adi
    Fauziah, Khusnul
    Nahrowi, Aufa Salsabila
    Faiz, Muhammad Nur
    Muhammad, Arif Wirawan
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 1 - 10
  • [6] Layered Security Framework for Intrusion Prevention
    Nalavade, Kamini
    Meshram, B. B.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 253 - 259
  • [7] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Cai, Chuanxi
    Mei, Shue
    Zhong, Weijun
    [J]. INFORMATION TECHNOLOGY & MANAGEMENT, 2019, 20 (02): : 55 - 71
  • [8] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Chuanxi Cai
    Shue Mei
    Weijun Zhong
    [J]. Information Technology and Management, 2019, 20 : 55 - 71
  • [9] Application of Intrusion Prevention in Campus Network Security
    Zhao, Weiguo
    Pan, Gangzhu
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 4279 - +
  • [10] Dismantling Intrusion Prevention Systems
    Niemi, Olli-Pekka
    Levomaki, Antti
    Manner, Jukka
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 285 - 286