-
1
-
-
0043166339
-
Anomaly Detection in IP Networks
-
M. Thottan, C. Y. Ji, Anomaly Detection in IP Networks, IEEE Transactions on Signal Processing, Vol.51, No.8, 2003, pp.2191-2204.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.Y.2
-
2
-
-
33744827418
-
Sequential Change-point Detection When Unknown Parameters Are Present in the Pre-change Distribution
-
Y. J. Mei, Sequential Change-point Detection When Unknown Parameters Are Present in the Pre-change Distribution, Ann. Statist, Vol.34, No.1, 2006, pp.92-122.
-
(2006)
Ann. Statist
, vol.34
, Issue.1
, pp. 92-122
-
-
Mei, Y.J.1
-
3
-
-
18944388780
-
Statistical Process Control for Shifts in Mean or Variance Using a Change-Point Formulation
-
D. M. Hawkins, K. D. Zamba, Statistical Process Control for Shifts in Mean or Variance Using a Change-Point Formulation. Technometrics, Vol.47, No.2, 2005, pp.164-173.
-
(2005)
Technometrics
, vol.47
, Issue.2
, pp. 164-173
-
-
Hawkins, D.M.1
Zamba, K.D.2
-
4
-
-
0037333205
-
Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data
-
N. Ye, S. Vilbert, Q. Chen, Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data, IEEE Transactions on Reliability, Vol.52, No.1, 2003, pp.75-82.
-
(2003)
IEEE Transactions on Reliability
, vol.52
, Issue.1
, pp. 75-82
-
-
Ye, N.1
Vilbert, S.2
Chen, Q.3
-
6
-
-
0036343692
-
Detecting SYN Flooding Attacks
-
H. N. Wang, D. L. Zhang, Kang G. Shin, Detecting SYN Flooding Attacks, Proceedings of IEEE INFOCOM, 2002, pp.1530-1539.
-
(2002)
Proceedings of IEEE INFOCOM
, pp. 1530-1539
-
-
Wang, H.N.1
Zhang, D.L.2
Kang, G.3
Shin4
-
7
-
-
33749466484
-
A Light-Weight Detection Method Against DDoS Attack
-
in Chinese
-
W. Chen, Y. X. He, W. L. Peng, A Light-Weight Detection Method Against DDoS Attack. Chinese Journal of Computers, Vol.29, No.8, 2006, pp.1392-1400. (in Chinese).
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.8
, pp. 1392-1400
-
-
Chen, W.1
He, Y.X.2
Peng, W.L.3
-
8
-
-
18144385431
-
Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks
-
A. S. Vasilios, P. Fotini, Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, Proceedings of GLOBECOM, Vol.4, 2004, pp.2050-2054.
-
(2004)
Proceedings of GLOBECOM
, vol.4
, pp. 2050-2054
-
-
Vasilios, A.S.1
Fotini, P.2
-
9
-
-
24644432749
-
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring
-
P. Tao, C. Leckie, K. Ramamohanarao, Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring, Proceedings of NETWORKING, Vol.1, 2004, pp 771-782.
-
(2004)
Proceedings of NETWORKING
, vol.1
, pp. 771-782
-
-
Tao, P.1
Leckie, C.2
Ramamohanarao, K.3
-
12
-
-
33745205813
-
Inferring internet denial of service activity
-
D. Moore, G. Voelker, and S. Savage, Inferring internet denial of service activity, ACM Transactions on Computer Systems, Vol.24, No.2, 2006, pp. 115-139.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
|