Snort
From MaRDI portal
Software:26052
swMATH14144MaRDI QIDQ26052FDOQ26052
Author name not available (Why is that?)
Cited In (16)
- A scalable intrusion detection system for IPv6
- Revisiting multiple pattern matching algorithms for multi-core architecture
- Privacy-preserving pattern matching on encrypted data
- Compressing Regular Expressions’ DFA Table by Matrix Decomposition
- Using data-independence in the analysis of intrusion detection systems
- Indices of Power in Optimal IDS Default Configuration: Theory and Examples
- A faster algorithm for matching a set of patterns with variable length don't cares
- Coevolutionary-based mechanisms for network anomaly detection
- Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA
- Principle components and importance ranking of distributed anomalies
- Two alternatives for handling preferences in qualitative choice logic
- A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention
- MULAN: Multi-Level Adaptive Network Filter
- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU
- A model of the behavior of network objects in distributed computer systems
- On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems
This page was built for software: Snort