سیستم تشخیص نفوذ مبتنی بر ناهنجاری (Persian Wikipedia)

Analysis of information sources in references of the Wikipedia article "سیستم تشخیص نفوذ مبتنی بر ناهنجاری" in Persian language version.

refsWebsite
Global rank Persian rank
1st place
1st place
2nd place
2nd place
488th place
282nd place
low place
low place
low place
low place

columbia.edu

sneakers.cs.columbia.edu

  • Wang, Ke (2004). "Anomalous Payload-Based Network Intrusion Detection" (PDF). Recent Advances in Intrusion Detection. Lecture Notes in Computer Science. Springer Berlin. 3224: 203–222. doi:10.1007/978-3-540-30143-1_11. ISBN 978-3-540-23123-3. Archived from the original (PDF) on 2010-06-22. Retrieved 2011-04-22.

cyber-ir.com

doi.org

  • Wang, Ke (2004). "Anomalous Payload-Based Network Intrusion Detection" (PDF). Recent Advances in Intrusion Detection. Lecture Notes in Computer Science. Springer Berlin. 3224: 203–222. doi:10.1007/978-3-540-30143-1_11. ISBN 978-3-540-23123-3. Archived from the original (PDF) on 2010-06-22. Retrieved 2011-04-22.

phrack.org

web.archive.org

  • Wang, Ke (2004). "Anomalous Payload-Based Network Intrusion Detection" (PDF). Recent Advances in Intrusion Detection. Lecture Notes in Computer Science. Springer Berlin. 3224: 203–222. doi:10.1007/978-3-540-30143-1_11. ISBN 978-3-540-23123-3. Archived from the original (PDF) on 2010-06-22. Retrieved 2011-04-22.
  • Alonso, Samuel. "Cyber Threat hunting with Sqrrl (From Beaconing to Lateral Movement)". Archived from the original on 31 July 2021. Retrieved 2019-08-17.