1 |
Andrew. Lockhart, "Snort Wireless Users Guide," 2003.
|
2 |
K. S. Kou, G. J. Mun, D. J. Ryu, "A Development of AIRTMS V1.0's Security Functional Requirements based on Common Criteria Version 3.1," Journal of Security Engineering, vol. 8, no. 6, pp. 645-655, Dec. 2011.
|
3 |
Y. S. Kim, K. S. Kou, J. I. Sin and Y. H. Bang, "Development of Security Functional Requirement Specification Tool of Information Security Operational System Level," Journal of Security Engineering, vol.7, no.1, Feb. 2010.
|
4 |
S. Y. Kang and J. H. Park, "The Research about Recent Common Criteria of Information Security Product," Journal of Security Engineering, vol.5, no.4, Aug. 2008.
|
5 |
Craig. Valli, "Wireless Snort-A WIDS in progress," Network & Information Forensics Conference, pp. 112-116, 2004.
|
6 |
Reddy, S. Vinjosh, et al. "Wireless hacking-a WiFi hack by cracking WEP," 2010 2nd International Conference on, vol. 1, pp. 189-193, 2010.
|
7 |
Ajita. Mishra and Ashish Kumar Srivastava, "A Modular Approach To Intrusion Detection in Homogenous Wireless Network," IOSR Journal of Computer Engineering, vol. 14, no. 6, pp. 53-59, Oct. 2013.
|
8 |
Martin. ROESCH, "Snort: Lightweight Intrusion Detection for Networks," Proceedings of LISA, pp. 229-238, 1999.
|
9 |
Steven T. Eckmann, "Translating Snort rules to STATL scenarios," Proc. Recent Advances in Intrusion Detection, 2001.
|
10 |
H. S. Kim, B. J. Kang, J. S. Yang and E. G. Im, "An Efficient Signature Detection Method using Growing Prefix Indexing for Intrusion Detection Systems," Journal of Security Engineering, vol. 9, no.1, Feb. 2012.
|