-
1
-
-
40649100857
-
-
BindView's RAZOR Security Team, Zombie Zapper, available on-line: http://razor.bindview.com/tools/ZombieZapper_form.shtml, 2001.
-
BindView's RAZOR Security Team, Zombie Zapper, available on-line: http://razor.bindview.com/tools/ZombieZapper_form.shtml, 2001.
-
-
-
-
2
-
-
34249966007
-
The CN2 induction algorithm
-
Clark P., and Niblett T. The CN2 induction algorithm. Mach. Learn. J. 3 4 (1989) 261-283
-
(1989)
Mach. Learn. J.
, vol.3
, Issue.4
, pp. 261-283
-
-
Clark, P.1
Niblett, T.2
-
3
-
-
40649124336
-
-
D. Dittrich, Distributed denial of service (DDoS) Attacks/tools, available on-line: http://staff.washington.edu/dittrich/misc/ddos/, 2006.
-
D. Dittrich, Distributed denial of service (DDoS) Attacks/tools, available on-line: http://staff.washington.edu/dittrich/misc/ddos/, 2006.
-
-
-
-
4
-
-
2442617148
-
Extracting rules from trained neural network using GA for managing E-business
-
Elalfi A.E., Haque R., and Elalami M.E. Extracting rules from trained neural network using GA for managing E-business. Appl. Soft Comput. 4 (2004) 65-77
-
(2004)
Appl. Soft Comput.
, vol.4
, pp. 65-77
-
-
Elalfi, A.E.1
Haque, R.2
Elalami, M.E.3
-
5
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
Garber L. Denial-of-service attacks rip the Internet. IEEE Comput. 33 4 (2000) 12-17
-
(2000)
IEEE Comput.
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
7
-
-
40649117032
-
-
R. Hanson, J. Stutz, P. Cheeseman, Bayesian Classification Theory, Technical Report FIA-90-12-7-01, NASA Ames Research Center, AI Branch, 1991.
-
R. Hanson, J. Stutz, P. Cheeseman, Bayesian Classification Theory, Technical Report FIA-90-12-7-01, NASA Ames Research Center, AI Branch, 1991.
-
-
-
-
8
-
-
40649124620
-
-
L. Holder, ML v2.0: Machine Learning Program Evaluator, available on-line: http://www-cse.uta.edu/∼holder/ftp/ml2.0.tar.gz.
-
L. Holder, ML v2.0: Machine Learning Program Evaluator, available on-line: http://www-cse.uta.edu/∼holder/ftp/ml2.0.tar.gz.
-
-
-
-
9
-
-
40649094376
-
-
K. Houle, G. Weaver, N. Long, R. Thomas, Trends in denial of service attack technology, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/DoS_trends.pdf, 2001.
-
K. Houle, G. Weaver, N. Long, R. Thomas, Trends in denial of service attack technology, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/DoS_trends.pdf, 2001.
-
-
-
-
10
-
-
40649093665
-
-
A. Householder, A. Manion, L. Pesante, G.M. Weaver, Managing the Threat of Denial-of-Service Attacks, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/Managing_DoS.pdf, 2001.
-
A. Householder, A. Manion, L. Pesante, G.M. Weaver, Managing the Threat of Denial-of-Service Attacks, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/Managing_DoS.pdf, 2001.
-
-
-
-
12
-
-
3142701996
-
-
Addison Wesley, Harlow, England
-
Karray F.O., and Silva C.D. Soft Computing Intelligent Systems Design: Theory, Tools and Applications (2004), Addison Wesley, Harlow, England
-
(2004)
Soft Computing Intelligent Systems Design: Theory, Tools and Applications
-
-
Karray, F.O.1
Silva, C.D.2
-
13
-
-
33644647191
-
Adaptation and interaction in dynamical systems: modelling and rule discovery through evolving connectionist systems
-
Kasabov N. Adaptation and interaction in dynamical systems: modelling and rule discovery through evolving connectionist systems. Appl. Soft Comput. 6 (2006) 307-322
-
(2006)
Appl. Soft Comput.
, vol.6
, pp. 307-322
-
-
Kasabov, N.1
-
14
-
-
40649095349
-
-
A.B. Kulkarni, S.F. Bush, S.C. Evans, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Technical Report 2001CRD176, GE Research and Development Center, 2001.
-
A.B. Kulkarni, S.F. Bush, S.C. Evans, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Technical Report 2001CRD176, GE Research and Development Center, 2001.
-
-
-
-
15
-
-
40649121599
-
-
Lawrence Berkeley National Laboratory's Network Research Group, libpcap: the Packet Capture library, available on-line: http://ftp.ee.lbl.gov/, 2002.
-
Lawrence Berkeley National Laboratory's Network Research Group, libpcap: the Packet Capture library, available on-line: http://ftp.ee.lbl.gov/, 2002.
-
-
-
-
18
-
-
0029306937
-
Prevention of congestion in packet-switched multistage interconnection networks
-
Liu J.C., Shin K.G., and Chang C.C. Prevention of congestion in packet-switched multistage interconnection networks. IEEE Trans. Parallel Distrib. Syst. 6 5 (1995) 535-541
-
(1995)
IEEE Trans. Parallel Distrib. Syst.
, vol.6
, Issue.5
, pp. 535-541
-
-
Liu, J.C.1
Shin, K.G.2
Chang, C.C.3
-
22
-
-
40649092666
-
-
The National Infrastructure Protection Center (NIPC), Potential Distributed Denial of Service (DDoS) Attacks, ADVISORY 01-021, 2001.
-
The National Infrastructure Protection Center (NIPC), Potential Distributed Denial of Service (DDoS) Attacks, ADVISORY 01-021, 2001.
-
-
-
-
23
-
-
0002432012
-
Towards flexible multi-agent decision-making under time pressure
-
Noh S., and Gmytrasiewicz P.J. Towards flexible multi-agent decision-making under time pressure. Proceedings of IJCAI (1999) 492-498
-
(1999)
Proceedings of IJCAI
, pp. 492-498
-
-
Noh, S.1
Gmytrasiewicz, P.J.2
-
24
-
-
35048886560
-
-
Springer Verlag, New York pp. 286-295
-
Noh S., Lee C., Choi K., and Jung G. Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning, Lecture Notes in Computer Science 2690 (2003), Springer Verlag, New York pp. 286-295
-
(2003)
Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning, Lecture Notes in Computer Science
, vol.2690
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
25
-
-
40649117511
-
-
Packet Storm, Tribe Flood Network 2000 (TFN2K) DDoS tool, available on-line: http://packetstormsecurity.org/distributed/TFN2k_Analysis-1.3.txt, 2000.
-
Packet Storm, Tribe Flood Network 2000 (TFN2K) DDoS tool, available on-line: http://packetstormsecurity.org/distributed/TFN2k_Analysis-1.3.txt, 2000.
-
-
-
-
27
-
-
40649100404
-
-
Standard Performance Evaluation Corporation, SPECweb99 Benchmark, available on-line: http://www.spec.org/osg/web99, 2005.
-
Standard Performance Evaluation Corporation, SPECweb99 Benchmark, available on-line: http://www.spec.org/osg/web99, 2005.
-
-
-
-
28
-
-
40649093162
-
-
TheoryGroup, Remote Intrusion Detector (RID), available on-line: http://www.theorygroup.com/Software/RID, 2001.
-
TheoryGroup, Remote Intrusion Detector (RID), available on-line: http://www.theorygroup.com/Software/RID, 2001.
-
-
-
-
30
-
-
0035402092
-
On the defense of the distributed denial of service attacks: an on-off feedback control approach
-
Xiong Y., Liu S., and Sun P. On the defense of the distributed denial of service attacks: an on-off feedback control approach. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 31 4 (2001) 282-293
-
(2001)
IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum.
, vol.31
, Issue.4
, pp. 282-293
-
-
Xiong, Y.1
Liu, S.2
Sun, P.3
-
31
-
-
0028385414
-
Fuzzy logic, neural networks and soft computing
-
Zadeh L.A. Fuzzy logic, neural networks and soft computing. Commun. ACM 37 3 (1994) 77-84
-
(1994)
Commun. ACM
, vol.37
, Issue.3
, pp. 77-84
-
-
Zadeh, L.A.1
|