Zafar et al., 2008 - Google Patents
Network security: a survey of modern approachesZafar et al., 2008
View PDF- Document ID
- 10673433517312624907
- Author
- Zafar M
- Naheed F
- Ahmad Z
- Anwar M
- Publication year
- Publication venue
- The Nucleus
External Links
Snippet
NETWORK SECURITY: A SURVEY OF MODERN APPROACHES Page 1 The Nucleus, 45 (1-2)
2008: 11-31 Network security: a survey of modern approaches 11 Pakistan The Nucleus The
Nucleus A Quarterly Scientific Journal of Pakistan Atomic NETWORK SECURITY: A SURVEY …
- 238000005516 engineering process 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agarwal et al. | A closer look at intrusion detection system for web applications | |
Cazorla et al. | Cyber stealth attacks in critical information infrastructures | |
Caswell et al. | Snort intrusion detection and prevention toolkit | |
Sharma et al. | Analysis of security data from a large computing organization | |
US7398389B2 (en) | Kernel-based network security infrastructure | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
Carter et al. | Intrusion prevention fundamentals | |
Dutta et al. | Intrusion detection systems fundamentals | |
Shivaprasad et al. | Enhancing network security through a multi-layered honeypot architecture with integrated network monitoring tools | |
Buchanan | Introduction to security and network forensics | |
Pallavi et al. | An analysis on network security tools and systems | |
Adiwal et al. | Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection | |
Kandan et al. | Network attacks and prevention techniques-a study | |
Paliwal | Honeypot: A trap for attackers | |
Kishore et al. | Intrusion detection system a need | |
Sandhu et al. | A study of the novel approaches used in intrusion detection and prevention systems | |
Singh et al. | A review on intrusion detection system | |
Zafar et al. | Network security: a survey of modern approaches | |
Panagiotakopoulos | Assessing open and closed EDRs | |
Pir | Intrusion detection techniques and open source intrusion detection (IDS) tools | |
Pasha | A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company | |
Pannu et al. | Systematic Approach Towards Analysis and Mitigation of Advanced Evasion Techniques | |
Falguni et al. | 'E-SPY': DETECTION AND PREDICTION OF WEBSITE ATTACKS. | |
Nair et al. | Advanced Cybersecurity Tools and Techniques |