Anomaly-based intrusion detection system (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Anomaly-based intrusion detection system" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
488th place
374th place
low place
low place
low place
low place
low place
low place
low place
low place

columbia.edu

sneakers.cs.columbia.edu

  • Wang, Ke (2004). "Anomalous Payload-Based Network Intrusion Detection" (PDF). Lecture Notes in Computer Science. Vol. 3224. Springer Berlin. pp. 203–222. doi:10.1007/978-3-540-30143-1_11. ISBN 978-3-540-23123-3. Archived from the original (PDF) on 2010-06-22. Retrieved 2011-04-22. {{cite book}}: |journal= ignored (help); Missing or empty |title= (help)

cyber-ir.com

doi.org

  • Wang, Ke (2004). "Anomalous Payload-Based Network Intrusion Detection" (PDF). Lecture Notes in Computer Science. Vol. 3224. Springer Berlin. pp. 203–222. doi:10.1007/978-3-540-30143-1_11. ISBN 978-3-540-23123-3. Archived from the original (PDF) on 2010-06-22. Retrieved 2011-04-22. {{cite book}}: |journal= ignored (help); Missing or empty |title= (help)
  • Perdisci, Roberto; Davide Ariu; Prahlad Fogla; Giorgio Giacinto; Wenke Lee (2009). "McPAD : A Multiple Classifier System for Accurate Payload-based Anomaly Detection" (PDF). Computer Networks. 5 (6): 864–881. doi:10.1016/j.comnet.2008.11.011.

ijcsi.org

perdisci.com

roberto.perdisci.com

phrack.org

web.archive.org

  • Wang, Ke (2004). "Anomalous Payload-Based Network Intrusion Detection" (PDF). Lecture Notes in Computer Science. Vol. 3224. Springer Berlin. pp. 203–222. doi:10.1007/978-3-540-30143-1_11. ISBN 978-3-540-23123-3. Archived from the original (PDF) on 2010-06-22. Retrieved 2011-04-22. {{cite book}}: |journal= ignored (help); Missing or empty |title= (help)
  • Alonso, Samuel. "Cyber Threat hunting with Sqrrl (From Beaconing to Lateral Movement)". Archived from the original on 2021-07-31. Retrieved 2019-08-17.