共 50 条
- [1] Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1051 - +
- [2] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems [J]. INFORMATION TECHNOLOGY & MANAGEMENT, 2019, 20 (02): : 55 - 71
- [3] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems [J]. Information Technology and Management, 2019, 20 : 55 - 71
- [4] Intrusion Detection and Prevention Systems (IDPS) and Security Issues [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (11): : 80 - 84
- [5] Intrusion prevention systems: superior security [J]. Network Security, 2007, 2007 (09) : 11 - 15
- [6] A security policy and Network Cartography based Intrusion Detection and Prevention Systems [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
- [7] Security Implications of Network Address Translation on Intrusion Detection and Prevention Systems [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 1 - 5
- [8] Security and Intrusion Detection on Critical SCADA Systems for Water Management [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, 2014,
- [9] Intrusion detection: Introduction to intrusion detection and security information management [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
- [10] Optimal configuration of intrusion detection systems [J]. Information Technology and Management, 2021, 22 : 231 - 244