System design based on the combination of firewall and intrusion detection technology

被引:0
|
作者
机构
来源
| 2005年 / Wuhan University of Technology, Wuhan, China卷 / 27期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] An Intelligent Intrusion Detection System Based on UPnP Technology for Smart Living
    Horng, Mong-Fong
    Chang, Bo-Chao
    Su, Bei-Hao
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 14 - +
  • [32] Realization of Intrusion Detection System based on the Improved Data Mining Technology
    Zhao Yan Jun
    Wei Ming Jun
    Wang Jing
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 982 - 987
  • [33] Optimization Scheme of Collaborative Intrusion Detection System Based on Blockchain Technology
    Huang, Jiachen
    Chen, Yuling
    Wang, Xuewei
    Ouyang, Zhi
    Du, Nisuo
    ELECTRONICS, 2025, 14 (02):
  • [34] Design of the Computer Intrusion Detection System
    Liu, Hui
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 747 - 751
  • [35] A Statefull Firewall and Intrusion Detection System Enforced with Secure Logging for Controller Area Network
    Lenard, Teri
    Bolboaca, Roland
    PROCEEDINGS OF THE 2021 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2021, 2021, : 39 - 45
  • [36] The Model Design of Educational Administration Safety-Based on Intrusion Detection Technology
    Wang Wei
    Liu XiTao
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 2, 2009, : 281 - 284
  • [37] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [38] Design and Implementation of Network Forensic System Based on Intrusion Detection analysis
    Jiang Liu
    Tian Guiyan
    Zhu Shidong
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 689 - 692
  • [39] Design and implementation of an agent-based firewall system
    Zhang, Lei
    Qing, Sihan
    2000, (11):
  • [40] Design of the Network Security Intrusion Detection System Based on the Cloud Computing
    Di, Meng
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 68 - 73