-
2
-
-
0242314805
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, "The Spread of the Sapphire/Slammer Worm", http://www.caida.org/out- reach/paper/2003/sapphire/sapphire.html
-
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
3
-
-
0742276097
-
Inside the slammer worm
-
Jul/Aug
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, "Inside the Slammer worm", IEEE Security & Privacy Magazine, Jul/Aug 2003, pp. 33-39
-
(2003)
IEEE Security & Privacy Magazine
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
7
-
-
85085718130
-
A signal analysis of network traffic anomalies
-
Nov. 6-8
-
P. Barford, J. Kline, D. Polka, A. Ron, "A Signal Analysis of Network Traffic Anomalies", IMW '02, Nov. 6-8, 2000
-
(2000)
IMW '02
-
-
Barford, P.1
Kline, J.2
Polka, D.3
Ron, A.4
-
8
-
-
0034296104
-
Traffic modeling., prediction, and congestion control for high-speed networks: A fuzzy AR approach
-
Oct.
-
B. Chen, S. Peng, K. Wang, "Traffic Modeling., Prediction, and Congestion Control for High-Speed Networks: A Fuzzy AR Approach", IEEE Trans. on Fuzzy Systems, Oct. 2000
-
(2000)
IEEE Trans. on Fuzzy Systems
-
-
Chen, B.1
Peng, S.2
Wang, K.3
-
9
-
-
0035153870
-
A statistical approach to predictive detection
-
J. L. Hellerstein, F. Zhang, P. Shahabuddin, "A Statistical Approach to Predictive Detection", Computer Networks, vol. 35, pp. 77-95, 2001
-
(2001)
Computer Networks
, vol.35
, pp. 77-95
-
-
Hellerstein, J.L.1
Zhang, F.2
Shahabuddin, P.3
-
11
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Oct.
-
C. Zou, L. Gao, W. Gong, D. Towsley, "Monitoring and Early Warning for Internet Worms", In Proc. of the 10th ACM Conference on Computer and Communication Security, Oct. 2003
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communication Security
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
12
-
-
0013264090
-
Proactive intrusion detection and distributed denial of service attacks - A case study in security management
-
June
-
J. B. D. Cabrera, L. Lewis, X. Qin, C. Gutierrez, W. Lee, R. K. Mehra, "Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management", Journal of Network and System Management, June 2002, pp. 224-254
-
(2002)
Journal of Network and System Management
, pp. 224-254
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Gutierrez, C.4
Lee, W.5
Mehra, R.K.6
-
13
-
-
6344258028
-
Early statistical anomaly intrusion detection of DoS attacks using MIB traffic parameters
-
June
-
J. Li, C. Manikopoulos, "Early Statistical Anomaly Intrusion Detection of DoS Attacks using MIB Traffic Parameters", Information Assurance Workshop 2003, June 2003, pp 53-59
-
(2003)
Information Assurance Workshop 2003
, pp. 53-59
-
-
Li, J.1
Manikopoulos, C.2
-
14
-
-
0004311217
-
-
Prentice Hall
-
G. Box, G. Jenkins, G. Reinsel, "Time Series Analysis", 3rd edition, Prentice Hall, 1994
-
(1994)
"Time Series Analysis", 3rd Edition
-
-
Box, G.1
Jenkins, G.2
Reinsel, G.3
-
15
-
-
33744984146
-
Early warning technique in public network by using traffic analysis
-
Aug.
-
K. H. Kwon, Y. G. Han, S. B. Jung, S. H. Kim, S. H. Lee, J. C. Na, "Early Warning Technique in Public Network by Using Traffic Analysis", Journal of Korea Institute of Information Security and Cryptography, Aug. 2004, pp 111-121
-
(2004)
Journal of Korea Institute of Information Security and Cryptography
, pp. 111-121
-
-
Kwon, K.H.1
Han, Y.G.2
Jung, S.B.3
Kim, S.H.4
Lee, S.H.5
Na, J.C.6
|