-
1
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
April
-
R. A. Kemmerer and G. Vigna, Intrusion detection: a brief history and overview, Supplement to IEEE Computer (IEEE Security & Privacy), 35 (4), April 2002, 27-30.
-
(2002)
Supplement to IEEE Computer (IEEE Security & Privacy)
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
2
-
-
1242331287
-
TBSE - An engineering approach to the design of accurate and reliable security systems
-
Feb.
-
J. Leach, TBSE - an engineering approach to the design of accurate and reliable security systems, Computer & Security, 23 (1), Feb. 2004, 22-28.
-
(2004)
Computer & Security
, vol.23
, Issue.1
, pp. 22-28
-
-
Leach, J.1
-
3
-
-
8344244591
-
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
M. Li, An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition, 23(7), Computer & Security, 2004, 549-558.
-
(2004)
Computer & Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
4
-
-
1642566050
-
Why information security is now multi-disciplinary, multi-departmental, and multi-organizational in nature
-
Jan.
-
C. C. Wood, Why information security is now multi-disciplinary, multi-departmental, and multi-organizational in nature, Computer Fraud & Security, Vol. 2004, Issue 1, Jan. 2004, 16-17.
-
(2004)
Computer Fraud & Security
, vol.2004
, Issue.1
, pp. 16-17
-
-
Wood, C.C.1
-
5
-
-
0346036085
-
Modeling autocorrelation function of self-similar teletraffic in communication networks based on optimal approximation in Hilbert space
-
M. Li, et al, Modeling autocorrelation function of self-similar teletraffic in communication networks based on optimal approximation in Hilbert space, Applied Mathematical Modelling, 27 (3), 2003, 155-168.
-
(2003)
Applied Mathematical Modelling
, vol.27
, Issue.3
, pp. 155-168
-
-
Li, M.1
-
6
-
-
0942299299
-
A correlation based computational model for synthesizing long-range dependent data
-
Sep.-Nov.
-
M. Li and C.-H. Chi, A correlation based computational model for synthesizing long-range dependent data, Journal of the Franklin Institute, 340 (6/7), Sep.-Nov. 2003, 503-514.
-
(2003)
Journal of the Franklin Institute
, vol.340
, Issue.6-7
, pp. 503-514
-
-
Li, M.1
Chi, C.-H.2
-
7
-
-
0034648575
-
Correlation form of timestamp increment sequences of self-similar traffic on Ethernet
-
Sep.
-
M. Li, et al, Correlation form of timestamp increment sequences of self-similar traffic on Ethernet, Electronics Letters, 36 (19), Sep. 2000, 1168-1169.
-
(2000)
Electronics Letters
, vol.36
, Issue.19
, pp. 1168-1169
-
-
Li, M.1
-
8
-
-
0031191180
-
Traffic models in broadband networks
-
A. Adas, Traffic models in broadband networks, IEEE Communications Magazine, 35 (7), 1997, 82-89.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.7
, pp. 82-89
-
-
Adas, A.1
-
9
-
-
0031338888
-
Teletraffic engineering in a broad-band era
-
Dec.
-
H. Michiel and K. Laevens, Teletraffic engineering in a broad-band era, Proc. of IEEE, 85 (12), Dec. 1997, 2007-2033.
-
(1997)
Proc. of IEEE
, vol.85
, Issue.12
, pp. 2007-2033
-
-
Michiel, H.1
Laevens, K.2
-
10
-
-
0000690179
-
Where mathematics meets the Internet
-
W. Willinger and V. Paxson, Where mathematics meets the Internet, Notices of the American Mathematical Society, 45 (8), 1998, 961-970.
-
(1998)
Notices of the American Mathematical Society
, vol.45
, Issue.8
, pp. 961-970
-
-
Willinger, W.1
Paxson, V.2
-
12
-
-
0003958505
-
-
Birkhauser, Boston
-
R. J. Adler, R. E. Feldman, and M. S. Taqqu, A Practical Guide to Heavy Tails: Statistical Techniques and Applications, Birkhauser, Boston, 1998.
-
(1998)
A Practical Guide to Heavy Tails: Statistical Techniques and Applications
-
-
Adler, R.J.1
Feldman, R.E.2
Taqqu, M.S.3
-
13
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
April
-
13 L. Garber, Denial-of-service attacks rip the Internet, IEEE Computer, 33 (4) April 2000, 12-17.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
14
-
-
0038755581
-
Intrusion detection: An introduction to internet surveillance, correlation, traps, trace back, and response
-
E. G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response, Intrusion.Net Book, 1999.
-
(1999)
Intrusion.Net Book
-
-
Amoroso, E.G.1
-
15
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
H. Federrath, editor, Springer-Verlag
-
J. Raymond, Traffic analysis: protocols, attacks, design issues and open problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, 2001.
-
(2001)
Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, Volume 2009 of LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
|