共 50 条
- [2] On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks [J]. APPLIED SCIENCES-BASEL, 2022, 12 (02):
- [3] A hybrid alarm management strategy in signature-based intrusion detection systems [J]. 2019 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM 2019), 2019,
- [5] Variables influencing the effectiveness of signature-based network intrusion detection systems [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 711 - 728
- [6] Characterizing Realistic Signature-based Intrusion Detection Benchmarks [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 97 - 103
- [8] CBSigIDS: Towards Collaborative Blockchained Signature-based Intrusion Detection [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1228 - 1235
- [9] Using decision trees to improve signature-based intrusion detection [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 173 - 191
- [10] USAID: Unifying signature-based and anomaly-based intrusion detection [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 702 - 712