These are the sources and citations used to research EE502 References. This bibliography was generated on Cite This For Me on
In-text: (Bahrami and Bahrami, 2011)
Your Bibliography: Bahrami, M. and Bahrami, M., 2011. An overview to Software Architecture in Intrusion Detection System. International Journal of Soft Computing and Software Engineering, 1(1), pp.1-8.
In-text: (Bruneau, 2001)
Your Bibliography: Bruneau, G., 2001. The History and Evolution of Intrusion Detection. The SANS Institute.
In-text: (Cardenas, Baras and Seamon, 2006)
Your Bibliography: Cardenas, A., Baras, J. and Seamon, K., 2006. A Framework for the Evaluation of Intrusion Detection Systems. In: IEEE Symposium on Security and Privacy. Oakland: IEEE, pp.15-77.
In-text: (Corley, Weir, Nelson and Karam, 2004)
Your Bibliography: Corley, M., Weir, M., Nelson, K. and Karam, A., 2004. SIMPLIFIED PROTOCOL CAPTURE (SIMPCAP). In: IEEE SMC Information Assurance Workshop. IEEE, pp.176-182.
In-text: (Das et al., 2008)
Your Bibliography: Das, A., Nguyen, D., Zambreno, J., Memik, G. and Choudhary, A., 2008. An FPGA-Based Network Intrusion Detection Architecture. IEEE Trans.Inform.Forensic Secur., 3(1), pp.118-132.
In-text: (Daxin and Yang, 2008)
Your Bibliography: Daxin, T. and Yang, X., 2008. A Multi-core Supported Intrusion Detection System. In: IFIP International Conference on Network and Parallel Computing. Shanghai: IEEE, pp.50-55.
In-text: (Ferro et al., 2005)
Your Bibliography: Ferro, A., Liberal, F., Munoz, A., Delgado, I. and Beaumont, A., 2005. Software Architecture Based on Multiprocessor Platform to Apply Complex Intrusion Detection Techniques. In: International Carnahan Conference on Security Technology. IEEE, pp.287-290.
In-text: (Glass, 2007)
Your Bibliography: Glass, M., 2007. IRIG 106 Chapter 10 standardizes MIL-STD-1553B data recording. In: IEEE/AIAA Digital Avionics Systems Conference. Dallas: IEEE, pp.2.B.5-1 - 2.B.5-9.
In-text: (Kazienko and Dorosz, 2003)
Your Bibliography: Kazienko, P. and Dorosz, P., 2003. Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture). [online] WindowSecurity.com. Available at: <http://www.windowsecurity.com/articles-tutorials/intrusion_detection/Intrusion_Detection_Systems_IDS_Part_I__network_intrusions_attack_symptoms_IDS_tasks_and_IDS_architecture.html> [Accessed 28 January 2015].
In-text: (Mirpuryan, Tavizi and Gharaee, 2012)
Your Bibliography: Mirpuryan, M., Tavizi, T. and Gharaee, H., 2012. A Comprehensive Network Intrusion Detection and Prevention System Architecture. In: International Symposium on Telecommunications. Tehran: IEEE, pp.954-958.
In-text: (Murphy, 2012)
Your Bibliography: Murphy, C., 2012. An Analysis of the Snort Data Acquisition Modules. The SANS Institute.
In-text: (Orosz and Skopko, 2010)
Your Bibliography: Orosz, P. and Skopko, T., 2010. Software-based Packet Capturing with High Precision Timestamping for Linux. In: International Conference on Systems and Networks Communications. Nice: IEEE, pp.381-386.
In-text: (Paquet, 2013)
Your Bibliography: Paquet, J., 2013. Uncovering MIL-STD-1553 Vulnerabilities: Exploiting Military Aircraft Networks. M.A.Sc. Thesis Proposal. Royal Military College of Canada.
In-text: (Qadeer, Zahid, Iqbal and Siddiqui, 2010)
Your Bibliography: Qadeer, M., Zahid, M., Iqbal, A. and Siddiqui, M., 2010. Network Traffic Analysis and Intrusion Detection using Packet Sniffer. In: International Conference on Communication Software and Networks. Singapore: IEEE, pp.313-317.
In-text: (SANS Institute, 2001)
Your Bibliography: SANS Institute, 2001. Intrusion Detection Systems: Definition, Need, and Challenges. The SANS Institute.
In-text: (Scarfone and Mell, 2007)
Your Bibliography: Scarfone, K. and Mell, P., 2007. Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology.
In-text: (Schuh, 1988)
Your Bibliography: Schuh, R., 1988. An overview of the 1553 bus with testing and simulation considerations. In: Instrumentation and Measurement Technology Conference. San Diego: IEEE, pp.20-25.
In-text: (Uzuncaova, 2003)
Your Bibliography: Uzuncaova, E., 2003. A Generic Software Architecture for Deception-Based Intrusion Detection and Response Systems. M.S. Thesis. US Naval Postgraduate School.
In-text: (White, Fitzsimmons and Matthews, 2013)
Your Bibliography: White, J., Fitzsimmons, T. and Matthews, J., 2013. Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. In: SPIE Defense, Security, and Sensing. Baltimore: SPIE, p.875704.
In-text: (Yoon et al., 2013)
Your Bibliography: Yoon, M., Mohan, S., Choi, J., Kim, J. and Sha, L., 2013. SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In: IEEE Real-Time and Embedded Technology and Applications Symposium. Philadelphia: IEEE, pp.21-32.
10,587 students joined last month!