Part of the Information Security Commons
Active snort rules and the needs for computing resources: Computing resources needed to activate different numbers of snort rules, Chad A. Arney, Xinli Wang School of Technology Publications
PDF
Advanced Search