共 50 条
- [1] Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection [J]. 2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 336 - 341
- [2] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection [J]. 2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
- [3] Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System [J]. WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 172 - 177
- [5] Internet Protocol Identification Number based Ideal Stealth Port Scan Detection using Snort [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2016, : 422 - 427
- [6] Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,