-
2
-
-
1642535783
-
A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
-
IEEE CS Press
-
R.B. Blazek et al, "A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," Proc. IEEE Workshop Information Assurance and Security, IEEE CS Press, 2001, pp. 220-226.
-
(2001)
Proc. IEEE Workshop Information Assurance and Security
, pp. 220-226
-
-
Blazek, R.B.1
-
4
-
-
31544436627
-
Denial-of-Service Attack Detection Techniques
-
January
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-Service Attack Detection Techniques," IEEE Internet Computing, January 2006.
-
(2006)
IEEE Internet Computing
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
5
-
-
49149117703
-
-
http://www.cert.org/advisories/CA-1996-21.html
-
-
-
-
6
-
-
51249086598
-
-
Thomas, Elements of Information Theory, second edition
-
Thomas M. Cover and Joy A. Thomas, Elements of Information Theory, second edition, 2007.
-
(2007)
Cover and Joy A
-
-
Thomas, M.1
-
8
-
-
84942256107
-
Statistical Approaches to DDoS Attack Detection and Response
-
IEEE CS Press, pp
-
L Feinstein et al., "Statistical Approaches to DDoS Attack Detection and Response," Proc. DARPA Information Survivability Conf. and Exposition, vol. 1, 2003, IEEE CS Press, pp. 303-314.
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
-
9
-
-
0002000920
-
Denial-of-Service attacks rip the Internet
-
April
-
L. Garber, Denial-of-Service attacks rip the Internet, IEEE Computer, 33(4): 12-17, April 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
11
-
-
0003531721
-
An Analysis of Security Incidents on the Internet,
-
PhD thesis, Carnegie Mellon University, Aug
-
J. Howard, "An Analysis of Security Incidents on the Internet," PhD thesis, Carnegie Mellon University, Aug., 1998.
-
(1998)
-
-
Howard, J.1
-
13
-
-
34548183355
-
A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain
-
Feb
-
K. Kumar, R.C., Joshi, and K., Singh, "A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain," the International Conference on Signal Processing, Communications and Networking, 2007. ICSCN '07. Feb. 2007 pp:331 - 337.
-
(2007)
the International Conference on Signal Processing, Communications and Networking, 2007. ICSCN '07
, pp. 331-337
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
16
-
-
18944365028
-
Performing Integrated System Tests Using Malicious Component Insertion
-
Charalampos Patrikakis, Thomas Kalamaris, Vaios Kakavas, "Performing Integrated System Tests Using Malicious Component Insertion," Electronic Notes in Theoretical Computer Science, Volume 82 No. 6 (2003).
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.82
, Issue.6
-
-
Patrikakis, C.1
Kalamaris, T.2
Kakavas, V.3
-
17
-
-
33847730651
-
Distributed Denial of Service Attacks
-
December
-
Charalampos Patrikakis, Michalis Masikos, and Olga Zouraraki, "Distributed Denial of Service Attacks," The Internet Protocol Journal, Volume 7, Issue 4, December, 2004.
-
(2004)
The Internet Protocol Journal
, vol.7
, Issue.4
-
-
Patrikakis, C.1
Masikos, M.2
Zouraraki, O.3
-
18
-
-
49149097648
-
-
http://www.paypal.com/html/computerworld-011402.html
-
-
-
-
20
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
October-December
-
Haining Wang, Danlu Zhang and Kang G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Transactions on Dependable and Secure Computing, Vol. 1, NO. 4, October-December 2004. pp193-208.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
|