A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
Organizations that benefit from information technologies are vulnerable to various attacks and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of defense which in conjunction with firewalls and other security components are applied to deal with intrusions and unautho...
Saved in:
Published in | Applied soft computing Vol. 92; p. 106301 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.07.2020
|
Subjects | |
Online Access | Get full text |
ISSN | 1568-4946 1872-9681 |
DOI | 10.1016/j.asoc.2020.106301 |
Cover
Loading…