What is Snort?
Snort® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry.
Krithika, Lakshitha, Monica, Priya, и Veena. International Journal of Innovative Research in Information Security, 09 (2):
21-27(мая 2023)1. Currency Recognition system using Image Processing. SANDEEP KUMAR CHAUBEY Andrew S. Morgan Kaufmann Publishers, 1995. 2. A Survey on Indian Currency Note Denomination Recognition System. Aruna Manpreet Bagga, Dr.Baljit Singh. 1995. 3. Dr. Baljith Singh, Aruna D H Indian currency note denomination system. 4. Ms. Monali Patil, Prof. Jayant Adhikari Detection of fake currency using digital image processing. 5. Arun Anoop M, Dr K.E. Kannammal Fake currency detection 6. Vidhi Roy and Sushanth Patil Fake Currency detection using image processing. 7. M. Deborah and Soniya Prathap Detection of Fake currency using edge detection. 8. Akash Rana, Avinash Kumar and Shivam Kumar Jha Detection of fake currency using machine learning technique. 9. Mayadevi, A. Gaikwad, Vaijinath, V. Bhosle and Vaibhav Currency note feature extraction. 10. Brinda M Object Detection using Haar-Like Feature Extraction..
R. Baker, и I. Martinovic. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, стр. 35--46. New York, NY, USA, ACM, (2016)
Z. Liao, S. Yang, и J. Liang. Proceedings of the 2010 IEEE/ACM Int'L Conference on Green Computing and Communications & Int'L Conference on Cyber, Physical and Social Computing, стр. 600--604. Washington, DC, USA, IEEE Computer Society, (2010)
A. Fragkiadakis, V. Siris, и N. Petroulakis. Wired/Wireless Internet Communications, том 6074 из Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)
W. Xu, W. Trappe, Y. Zhang, и T. Wood. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, стр. 46--57. New York, NY, USA, ACM, (2005)
Y. Ponomarchuk, и D. Seo. Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications (ICUT '09), стр. 1-6. (2009)
D. Liu, J. Raymer, и A. Fox. 9th International Conference on Mobile Adhoc and Sensor Systems (MASS), стр. 335-343. IEEE Computer Society, (декабря 2012)
M. Cakiroglu, и A. Özcerit. Proceedings of the 3rd international conference on Scalable information systems, стр. 4:1--4:8. ICST, Brussels, Belgium, Belgium, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), (2008)
J. Moskal, и C. Matheus. Rule Representation, Interchange and Reasoning on the Web, том 5321 из Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2008)
H. Kayacik, M. Heywood, и N. Zincir-Heywood. GECCO 2006: Proceedings of the 8th annual conference
on Genetic and evolutionary computation, 2, стр. 1667--1674. Seattle, Washington, USA, ACM Press, (8-12 July 2006)
C. Phua, V. Lee, K. Smith-Miles, и R. Gayler. DDDM '07: Proceedings of the 2007 international workshop on Domain driven data mining, стр. 1--10. (2007)
C. Woo, J. Choi, и M. Evens. Proceedings of the 6th International conference on Intelligent Tutoring
Systems, Biarritz, France and San Sebastian, Spain, (2002)