DOI:10.20894/IJWT. Periodicity: Bi Annual. Impact Factor: SJIF:4.78 & GIF:0.428 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
Y.Weinsberg. S Tzur-David, D.Doley, and T.Anker, "High Performance String Matching Algorithm for a Network Intrusion Prevention Systems(NIPS)", High Performance Switching and Routing, IEEE ,2006 View Artical
J. P. Anderson, "Computer Security Threat Monitoring and Surveillance", Jammes P Anderson and Co, Fort ashington, Pennsylv ,1980 View Artical
R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The Architecture of a Network Level Intrusion Detection System", Computer Science Department, University of New Mex ,1990 View Artical
H. G. Kayacik, A.N. Zincir-Heywood, and M.I. Heywood, "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detecti", in Proc. 3rd Annual Conference on Privacy, Securit ,2005 View Artical
A. A. Ghorbani, W. Lu, and M. Tavallaee, "Network Intrusion Detection and Prevention: Concepts and Techniques", ser. Advances in Information Security, Springer-Ve ,2009 View Artical
A. Singhal, "Data Warehousing and Data Mining Techniques for Cyber Security", Advances in Information Security, Springer ,2007 View Artical
D. Stiawan, A.H. Abdullah, and M.Y. Idris, "The Trends of Intrusion Prevention System Network", International Conference Education Technology and ,2010 View Artical
S.H. Oh and W.K. Lee, "An anomaly intrusion detection method by clustering normal user Behavior", Computers & Security ,Vol.22 ,2003 View Artical
A.D. Todd, R.A. Raines, R.O. Baldwin, B.E. Mullins, and S.K. Rogers, "Alert Verification Evaluation Through Server Response Forging", INCS ,2007 View Artical
H. Artail, H. Safa, M. Sraj, I. Kuwatly, and Z. Almasri, "A hybrid honeypot Framework for improving intrusion detection systems in protecting organizational n", Computer & Security ,Vol.25 ,2006 View Artical
P. Garcia-Teodora, J. Dian-Verdejo, G. Macia- Femandez, and E. Vazquez, "Anomaly- based network intrusion detection Techniques, systems and challenges", Computer & Security ,Vol.28 ,2009 View Artical
Wikipedia, "Intrusion Detection System ,2009 View Artical
H.Bhuyan, D. K. Bhattacharyya, and J. K.Kalita, "Surveying Port Scans and Their Detection Methodologies", The Computer Journal ,Vol.54 ,2011 View Artical
Joseph Migga Kizza, "Computer Network Security ,2005 View Artical
Siddarth Saha, "Network Intrusion Detection System Using String Matching", Internet ,2010 View Artical
Y.Weinsberg. S Tzur-David, D.Doley, and T.Anker, "High Performance String Matching Algorithm for a Network Intrusion Prevention Systems(NIPS)", High Performance Switching and Routing, IEEE ,Vol. ,2006 View Artical
R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The Architecture of a Network Level Intrusion Detection System", Computer Science Department, University of New Mex ,Vol. ,1990 View Artical
H. G. Kayacik, A.N. Zincir-Heywood, and M.I. Heywood, "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detecti", in Proc. 3rd Annual Conference on Privacy, Securit ,Vol. ,2005 View Artical
D. Stiawan, A.H. Abdullah, and M.Y. Idris, "The Trends of Intrusion Prevention System Network", International Conference Education Technology and ,Vol. ,2010 View Artical
S.H. Oh and W.K. Lee, "An anomaly intrusion detection method by clustering normal user Behavior", Computers & Security ,Vol.22 ,2003 View Artical
A.D. Todd, R.A. Raines, R.O. Baldwin, B.E. Mullins, and S.K. Rogers, "Alert Verification Evaluation Through Server Response Forging", INCS ,2007 View Artical
H. Artail, H. Safa, M. Sraj, I. Kuwatly, and Z. Almasri, "A hybrid honeypot Framework for improving intrusion detection systems in protecting organizational n", Computer & Security ,Vol.25 ,Issue 4 ,2006 View Artical
P. Garcia-Teodora, J. Dian-Verdejo, G. Macia- Femandez, and E. Vazquez, "Anomaly- based network intrusion detection Techniques, systems and challenges", Computer & Security ,Vol.28 ,Issue 2 ,2009 View Artical
H.Bhuyan, D. K. Bhattacharyya, and J. K.Kalita, "Surveying Port Scans and Their Detection Methodologies", The Computer Journal ,Vol.54 ,Issue 10 ,2011 View Artical
S.H. Oh and W.K. Lee, "An anomaly intrusion detection method by clustering normal user Behavior", Computers & Security ,Vol.22 ,Issue 7 ,2003 View Artical
A.D. Todd, R.A. Raines, R.O. Baldwin, B.E. Mullins, and S.K. Rogers, "Alert Verification Evaluation Through Server Response Forging", INCS ,2007 View Artical