These are the sources and citations used to research EE502 References. This bibliography was generated on Cite This For Me on

  • Journal

    Bahrami, M. and Bahrami, M.

    An overview to Software Architecture in Intrusion Detection System

    2011 - International Journal of Soft Computing and Software Engineering

    In-text: (Bahrami and Bahrami, 2011)

    Your Bibliography: Bahrami, M. and Bahrami, M., 2011. An overview to Software Architecture in Intrusion Detection System. International Journal of Soft Computing and Software Engineering, 1(1), pp.1-8.

  • Report

    Bruneau, G.

    The History and Evolution of Intrusion Detection

    2001 - The SANS Institute

    In-text: (Bruneau, 2001)

    Your Bibliography: Bruneau, G., 2001. The History and Evolution of Intrusion Detection. The SANS Institute.

  • Conference proceedings

    Cardenas, A., Baras, J. and Seamon, K.

    A Framework for the Evaluation of Intrusion Detection Systems

    2006 - IEEE - Oakland

    In-text: (Cardenas, Baras and Seamon, 2006)

    Your Bibliography: Cardenas, A., Baras, J. and Seamon, K., 2006. A Framework for the Evaluation of Intrusion Detection Systems. In: IEEE Symposium on Security and Privacy. Oakland: IEEE, pp.15-77.

  • Conference proceedings

    Corley, M., Weir, M., Nelson, K. and Karam, A.

    SIMPLIFIED PROTOCOL CAPTURE (SIMPCAP)

    2004 - IEEE

    In-text: (Corley, Weir, Nelson and Karam, 2004)

    Your Bibliography: Corley, M., Weir, M., Nelson, K. and Karam, A., 2004. SIMPLIFIED PROTOCOL CAPTURE (SIMPCAP). In: IEEE SMC Information Assurance Workshop. IEEE, pp.176-182.

  • Journal

    Das, A., Nguyen, D., Zambreno, J., Memik, G. and Choudhary, A.

    An FPGA-Based Network Intrusion Detection Architecture

    2008 - IEEE Trans.Inform.Forensic Secur.

    In-text: (Das et al., 2008)

    Your Bibliography: Das, A., Nguyen, D., Zambreno, J., Memik, G. and Choudhary, A., 2008. An FPGA-Based Network Intrusion Detection Architecture. IEEE Trans.Inform.Forensic Secur., 3(1), pp.118-132.

  • Conference proceedings

    Daxin, T. and Yang, X.

    A Multi-core Supported Intrusion Detection System

    2008 - IEEE - Shanghai

    In-text: (Daxin and Yang, 2008)

    Your Bibliography: Daxin, T. and Yang, X., 2008. A Multi-core Supported Intrusion Detection System. In: IFIP International Conference on Network and Parallel Computing. Shanghai: IEEE, pp.50-55.

  • Conference proceedings

    Ferro, A., Liberal, F., Munoz, A., Delgado, I. and Beaumont, A.

    Software Architecture Based on Multiprocessor Platform to Apply Complex Intrusion Detection Techniques

    2005 - IEEE

    In-text: (Ferro et al., 2005)

    Your Bibliography: Ferro, A., Liberal, F., Munoz, A., Delgado, I. and Beaumont, A., 2005. Software Architecture Based on Multiprocessor Platform to Apply Complex Intrusion Detection Techniques. In: International Carnahan Conference on Security Technology. IEEE, pp.287-290.

  • Conference proceedings

    Glass, M.

    IRIG 106 Chapter 10 standardizes MIL-STD-1553B data recording

    2007 - IEEE - Dallas

    In-text: (Glass, 2007)

    Your Bibliography: Glass, M., 2007. IRIG 106 Chapter 10 standardizes MIL-STD-1553B data recording. In: IEEE/AIAA Digital Avionics Systems Conference. Dallas: IEEE, pp.2.B.5-1 - 2.B.5-9.

  • Website

    Kazienko, P. and Dorosz, P.

    Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture)

    2003

    In-text: (Kazienko and Dorosz, 2003)

    Your Bibliography: Kazienko, P. and Dorosz, P., 2003. Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture). [online] WindowSecurity.com. Available at: <http://www.windowsecurity.com/articles-tutorials/intrusion_detection/Intrusion_Detection_Systems_IDS_Part_I__network_intrusions_attack_symptoms_IDS_tasks_and_IDS_architecture.html> [Accessed 28 January 2015].

  • Conference proceedings

    Mirpuryan, M., Tavizi, T. and Gharaee, H.

    A Comprehensive Network Intrusion Detection and Prevention System Architecture

    2012 - IEEE - Tehran

    In-text: (Mirpuryan, Tavizi and Gharaee, 2012)

    Your Bibliography: Mirpuryan, M., Tavizi, T. and Gharaee, H., 2012. A Comprehensive Network Intrusion Detection and Prevention System Architecture. In: International Symposium on Telecommunications. Tehran: IEEE, pp.954-958.

  • Report

    Murphy, C.

    An Analysis of the Snort Data Acquisition Modules

    2012 - The SANS Institute

    In-text: (Murphy, 2012)

    Your Bibliography: Murphy, C., 2012. An Analysis of the Snort Data Acquisition Modules. The SANS Institute.

  • Conference proceedings

    Orosz, P. and Skopko, T.

    Software-based Packet Capturing with High Precision Timestamping for Linux

    2010 - IEEE - Nice

    In-text: (Orosz and Skopko, 2010)

    Your Bibliography: Orosz, P. and Skopko, T., 2010. Software-based Packet Capturing with High Precision Timestamping for Linux. In: International Conference on Systems and Networks Communications. Nice: IEEE, pp.381-386.

  • Dissertation

    Paquet, J.

    Uncovering MIL-STD-1553 Vulnerabilities: Exploiting Military Aircraft Networks

    2013

    In-text: (Paquet, 2013)

    Your Bibliography: Paquet, J., 2013. Uncovering MIL-STD-1553 Vulnerabilities: Exploiting Military Aircraft Networks. M.A.Sc. Thesis Proposal. Royal Military College of Canada.

  • Conference proceedings

    Qadeer, M., Zahid, M., Iqbal, A. and Siddiqui, M.

    Network Traffic Analysis and Intrusion Detection using Packet Sniffer

    2010 - IEEE - Singapore

    In-text: (Qadeer, Zahid, Iqbal and Siddiqui, 2010)

    Your Bibliography: Qadeer, M., Zahid, M., Iqbal, A. and Siddiqui, M., 2010. Network Traffic Analysis and Intrusion Detection using Packet Sniffer. In: International Conference on Communication Software and Networks. Singapore: IEEE, pp.313-317.

  • Report

    SANS Institute

    Intrusion Detection Systems: Definition, Need, and Challenges

    2001 - The SANS Institute

    In-text: (SANS Institute, 2001)

    Your Bibliography: SANS Institute, 2001. Intrusion Detection Systems: Definition, Need, and Challenges. The SANS Institute.

  • Report

    Scarfone, K. and Mell, P.

    Guide to Intrusion Detection and Prevention Systems (IDPS)

    2007 - National Institute of Standards and Technology

    In-text: (Scarfone and Mell, 2007)

    Your Bibliography: Scarfone, K. and Mell, P., 2007. Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology.

  • Conference proceedings

    Schuh, R.

    An overview of the 1553 bus with testing and simulation considerations

    1988 - IEEE - San Diego

    In-text: (Schuh, 1988)

    Your Bibliography: Schuh, R., 1988. An overview of the 1553 bus with testing and simulation considerations. In: Instrumentation and Measurement Technology Conference. San Diego: IEEE, pp.20-25.

  • Dissertation

    Uzuncaova, E.

    A Generic Software Architecture for Deception-Based Intrusion Detection and Response Systems

    2003

    In-text: (Uzuncaova, 2003)

    Your Bibliography: Uzuncaova, E., 2003. A Generic Software Architecture for Deception-Based Intrusion Detection and Response Systems. M.S. Thesis. US Naval Postgraduate School.

  • Conference proceedings

    White, J., Fitzsimmons, T. and Matthews, J.

    Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata

    2013 - SPIE - Baltimore

    In-text: (White, Fitzsimmons and Matthews, 2013)

    Your Bibliography: White, J., Fitzsimmons, T. and Matthews, J., 2013. Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. In: SPIE Defense, Security, and Sensing. Baltimore: SPIE, p.875704.

  • Conference proceedings

    Yoon, M., Mohan, S., Choi, J., Kim, J. and Sha, L.

    SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems

    2013 - IEEE - Philadelphia

    In-text: (Yoon et al., 2013)

    Your Bibliography: Yoon, M., Mohan, S., Choi, J., Kim, J. and Sha, L., 2013. SecureCore: A Multicore-based Intrusion Detection Architecture for Real-Time Embedded Systems. In: IEEE Real-Time and Embedded Technology and Applications Symposium. Philadelphia: IEEE, pp.21-32.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join