References
Internet Security Threat Report. Vol. 24. Symantec, 2019.
Computer Virus Propagation Petri-Object Simulation." In Advances in Intelligent Systems and Computing 1019, 103-112. Cham: Springer, 2020. "
Web Applications vulnerabilities and threats: statistics for 2019. Positive Technologies, 2020.
Traffic Abnormalities Identification Based on the Stationary Parameters Estimation and Wavelet Function Detailization." In Advances in Intelligent Systems and Computing 1019, 83-95. Cham: Springer, 2020. "
A Taxonomy of Malicious Traffic for Intrusion Detection Systems In 2018 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). Glasgow, UK., 2018.
Survey of intrusion detection systems: techniques, datasets and challenges." Cybersecurity 2 (2019). "
Attack Signatures. Broadcom, 2020.
An adaptive system for detecting malicious queries in web attacks." Science China Information Sciences 61 (2018). "
"Evading IDS, Firewalls and Detecting Honeypots." In Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures, 77-134. Second ed. Boston, USA: Cengage Learning, 2016.
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: TrustCom , 2012.
Hybrid Intrusion Detection System: Technology and Development." International Journal of Computer Applications 115, no. 9 (2015): 5-8. "
Man in the middle (MITM) attack. Imperva, 2020.
Advanced Malware Detection with Suricata Lua Scripting. Trustwave, 2017.
Understanding Heuristic-based Scanning vs. Sandboxing. Opswat, 2015.
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices." ACM Computing surveys 48, no. 1 (2015): 1-41. "
Proof of Stake for Blockchain Based Distributed Intrusion Detecting System." In Advances in Intelligent Systems and Computing 1265, 237-247. Cham: Springer, 2021. "