|
1 可使非法入侵偵測系統失效. http://texh.sina.com.cn/s/n/58376.shtml 2 入侵偵測系統與入侵方法. http://www.csie.nctu.edu.tw/sjhuang/ids.php 3 永遠的 UNIX, 怎樣使用 Snort. http://www.fanqiang.com/a5/b6/ 4 永遠的 UNIX, Snort 分析報告. http://www.fanqiang.com/a5/b6/ 5 Network-based intrusion detection using neural. 6 Real time data mining-based intrusion detection. 7 Intrusion detection using sequences of system calls. 8 Optimization of network traffic parameters via an evolution strategy. 9 Snort, the open source network intrusion detection system. 10 Snrot Users Manual Snort Release : 1.8. 11 Increasing performance in high speed nids. 12 An Achilles'' Heel in Signature-Based IDS : Squealing False Positives in Snort 13 Insertion, evasion, and denial of service : Eluding network intrusion detection. 14 Network intrusion detection: Evasion, traffic normalization, and end-to-end jprotocol semantics. 15 Towards faster string matching for intrusion detection or execcding the speed of snort. 16 Snort, the open source network intrusion detection .
|