[IEEE] An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment

zekariasm Post time 2024-6-16 14:59:14 | Show all posts |Read mode
Reward10points

journal:2017 International Conference on Inventive Communication and Computational Technologies (ICICCT)

Authors:RaviTeja Gaddam; M. Nandhini

Published date:2017-3-

DOI:10.1109/icicct.2017.7975177

PDF link:https://ieeexplore.ieee.org/stampPDF/getPDF.jsp?arnumber=7975177

Article link:http://dx.doi.org/10.1109/icicct.2017.7975177

Article Source:IEEE


Remark:

Best Answer

Please adopt

View Full Content

Reply

Use magic Donate Report

All Reply2 Show all posts
Nixxiflo Post time 2024-6-16 14:59:15 | Show all posts

This post has been completed

Completed attachments will be deleted within 24 hours.
Reply

Use magic Donate Report

Georgee Post time 2024-6-16 14:59:39 | Show all posts

This post has been completed

Completed attachments will be deleted within 24 hours.
Reply

Use magic Donate Report

Junior Member
  • post

  • reply

  • points

    0

Latest Reply

Return to the list