-
1
-
-
8344244591
-
An approach for reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
M. Li, An approach for reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition, 23 (6),Computer & Security, 2004.
-
(2004)
Computer & Security
, vol.23
, Issue.6
-
-
Li, M.1
-
4
-
-
84972521562
-
Self-similarity in high-speed packet traffic: Analysis and modeling of Ethernet traffic measurements
-
W. Willinger, M. S. Taqqu, W. E. Leland, and D. V. Wilson, Self-similarity in high-speed packet traffic: analysis and modeling of Ethernet traffic measurements, Statistical Science, 10 (10), 1995, 67-85.
-
(1995)
Statistical Science
, vol.10
, Issue.10
, pp. 67-85
-
-
Willinger, W.1
Taqqu, M.S.2
Leland, W.E.3
Wilson, D.V.4
-
5
-
-
0000690179
-
Where mathematics meets the Internet
-
W. Willinger and V. Paxson, Where mathematics meets the Internet, Notices of the American Mathematical Society, 45 (8), 1998, 961-970.
-
(1998)
Notices of the American Mathematical Society
, vol.45
, Issue.8
, pp. 961-970
-
-
Willinger, W.1
Paxson, V.2
-
6
-
-
0031191180
-
Traffic models in broadband networks
-
A. Adas, Traffic models in broadband networks, IEEE Communications Magazine, 35 (7), 1997, 82-89.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.7
, pp. 82-89
-
-
Adas, A.1
-
7
-
-
0034648575
-
Correlation form of timestamp increment sequences of selfsimilar traffic on Ethernet
-
M. Li, W. Jia, and W. Zhao, Correlation form of timestamp increment sequences of selfsimilar traffic on Ethernet, Electronics Letters, 36(19), 2000,1168-1169.
-
(2000)
Electronics Letters
, vol.36
, Issue.19
, pp. 1168-1169
-
-
Li, M.1
Jia, W.2
Zhao, W.3
-
8
-
-
0942299299
-
A correlation based computational model for synthesizing long-range dependent data
-
M. Li and C.-H. Chi, A correlation based computational model for synthesizing long-range dependent data, J. Franklin Institute, 340 (6-7), 2003, 503-514.
-
(2003)
J. Franklin Institute
, vol.340
, Issue.6-7
, pp. 503-514
-
-
Li, M.1
Chi, C.-H.2
-
9
-
-
0031338888
-
Teletraffic engineering in a broad-band era
-
Dec.
-
H. Michiel and K. Laevens, Teletraffic engineering in a broad-band era, Proc. of the IEEE, 85 (12). Dec. 1997,2007-2033.
-
(1997)
Proc. of the IEEE
, vol.85
, Issue.12
, pp. 2007-2033
-
-
Michiel, H.1
Laevens, K.2
-
10
-
-
0029323403
-
Wide area traffic: The failure of Poison modeling
-
June
-
V. Paxson and S. Floyd, Wide area traffic: the failure of Poison modeling, IEEE/ACM Trans, on Networking, 3 (3), June 1995, 226-244.
-
(1995)
IEEE/ACM Trans, on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
11
-
-
0032167248
-
Self-similar processes in communications networks
-
Sep.
-
B. Tsybakov and N. D. Georganas, Self-similar processes in communications networks, IEEE Trans, on Information Theory, 44 (5), Sep. 1998, 1713-1725.
-
(1998)
IEEE Trans, on Information Theory
, vol.44
, Issue.5
, pp. 1713-1725
-
-
Tsybakov, B.1
Georganas, N.D.2
-
12
-
-
0346036085
-
Modeling autocorrelation functions of selfsimilar teletraffic in communication networks based on optimal approximation in Hubert space
-
M. Li, W. Zhao, D. Y. Long, and C.-H. Chi, Modeling autocorrelation functions of selfsimilar teletraffic in communication networks based on optimal approximation in Hubert space, Applied Mathematical Modelling, 27 (3), 2003, 155-168.
-
(2003)
Applied Mathematical Modelling
, vol.27
, Issue.3
, pp. 155-168
-
-
Li, M.1
Zhao, W.2
Long, D.Y.3
Chi, C.-H.4
-
13
-
-
0031246030
-
Fast, approximate synthesis of fractional Gaussian noise for generating selfsimilar network traffic
-
Oct.
-
V. Paxson, Fast, approximate synthesis of fractional Gaussian noise for generating selfsimilar network traffic, Computer Comm. Review, 27 (5), Oct. 1997,5-18.
-
(1997)
Computer Comm. Review
, vol.27
, Issue.5
, pp. 5-18
-
-
Paxson, V.1
|