Snort
From MaRDI portal
Cited in
(33)- A scalable intrusion detection system for IPv6
- Revisiting multiple pattern matching algorithms for multi-core architecture
- Zabbix
- Analyzing matching time behavior of backtracking regular expression matchers by using ambiguity of NFA
- Privacy-preserving pattern matching on encrypted data
- Using data-independence in the analysis of intrusion detection systems
- A faster algorithm for matching a set of patterns with variable length don't cares
- MULAN: multi-level adaptive network filter
- An efficient pre-filtering mechanism for parallel intrusion detection based on many-core GPU
- Coevolutionary-based mechanisms for network anomaly detection
- Principle components and importance ranking of distributed anomalies
- TCPDUMP
- WebStat
- Xilinx
- OpenNebula
- Gnort
- Autograph
- ADEPTS
- RRE
- mySVM
- SGX
- Hamsa
- Polygraph
- BLINC
- QEMU
- ADAM
- Saner
- Two alternatives for handling preferences in qualitative choice logic
- A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention
- A model of the behavior of network objects in distributed computer systems
- On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems
- Compressing regular expressions' DFA table by matrix decomposition
- Indices of power in optimal IDS default configuration: theory and examples
This page was built for software: Snort