共 50 条
- [2] Building intrusion pattern miner for snort network intrusion detection system [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 477 - 484
- [3] On the fly pattern matching for intrusion detection with SnortFiltrage de Paquets à la Volée pour la Détection D’Intrusions avec Snort [J]. Annales des Télécommunications, 2004, 59 (9-10): : 1045 - 1071
- [4] Towards faster string matching for intrusion detection or exceeding the speed of snort [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 367 - 373
- [5] Research of pattern matching in intrusion detection [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1877 - 1882
- [6] Robust and Fast Pattern Matching for Intrusion Detection [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
- [7] An Effective Pattern Matching Algorithm for Intrusion Detection [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3010 - +
- [8] IMPROVEMENT OF ALGORITHM FOR PATTERN MATCHING IN INTRUSION DETECTION [J]. 2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 281 - 284
- [10] Improved Algorithm of pattern matching for Intrusion Detection [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 446 - 449