-
3
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Mirkovic J., Reiher P., A taxonomy of DDoS attack and DDoS defense mechanisms Computer Communication Review 2004 34 2 39 53
-
(2004)
Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
4
-
-
33745205813
-
Inferring internet denial-of-service activity
-
Moore D., Shannon C., Brown D. J., Voelker G. M., Savage S., Inferring internet denial-of-service activity ACM Transactions on Computer Systems 2006 24 2 115 139
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
5
-
-
77954512901
-
-
2008, http://www.ddos.com/index.php?content=products/background.html
-
Background on DDoS. 2008, http://www.ddos.com/index.php?content=products/ background.html
-
Background on DDoS
-
-
-
7
-
-
3042825073
-
IP traceback: A new denial-of-service deterrent?
-
Aljifri H., IP traceback: a new denial-of-service deterrent? IEEE Security and Privacy 2003 1 3 24 31
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 24-31
-
-
Aljifri, H.1
-
8
-
-
0033650584
-
Practical network support for IP traceback
-
Savage S., Wetherall D., Karlin A., Anderson T., Practical network support for IP traceback Computer Communication Review 2000 30 4 295 306
-
(2000)
Computer Communication Review
, vol.30
, Issue.4
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
10
-
-
8344244591
-
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
Li M., An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition Computers and Security 2004 23 7 549 558
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
11
-
-
59249106247
-
DDoS attacks detection model and its application
-
Li M., Li M., Jiang X., DDoS attacks detection model and its application WSEAS Transactions on Computers 2008 7 8 1159 1168
-
(2008)
WSEAS Transactions on Computers
, vol.7
, Issue.8
, pp. 1159-1168
-
-
Li, M.1
Li, M.2
Jiang, X.3
-
15
-
-
77954482694
-
-
US patent no. US7,587,761 b2, September 2009
-
Zou C. C., Duffield N., Towsley D., Gong W., Adaptive defense against various network attacks. US patent no. US7,587,761 b2, September 2009
-
Adaptive defense against various network attacks
-
-
Zou, C.C.1
Duffield, N.2
Towsley, D.3
Gong, W.4
-
16
-
-
33646742035
-
PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Kim Y., Lau W. C., Chuah M. C., Chao H. J., PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks IEEE Transactions on Dependable and Secure Computing 2006 3 2 141 155
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
17
-
-
26444519904
-
HAWK: Halting anomalies with weighted choKing to rescue well-behaved TCP sessions from shrew DDoS attacks
-
February Lecture Notes in Computer Science
-
Kwok Y.-K., Tripathi R., Chen Y., Hwang K., HAWK: halting anomalies with weighted choKing to rescue well-behaved TCP sessions from shrew DDoS attacks 3619 Proceedings of the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC '05) February 2005 423 432 Lecture Notes in Computer Science
-
(2005)
Proceedings of the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC '05)
, vol.3619
, pp. 423-432
-
-
Kwok, Y.-K.1
Tripathi, R.2
Chen, Y.3
Hwang, K.4
-
18
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
-
August
-
Park K., Lee H., On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets Proceedings of the ACM Conference on Internet Measurement (SIGCOMM '01) August 2001 15 26
-
(2001)
Proceedings of the ACM Conference on Internet Measurement (SIGCOMM '01)
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
19
-
-
50949130514
-
Wavelet-based detection of DoS attacks
-
November San Francisco, Calif, USA
-
Dainotti A., Pescap A., Ventre G., Wavelet-based detection of DoS attacks Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '06) November 2006 San Francisco, Calif, USA 1 6
-
(2006)
Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '06)
, pp. 1-6
-
-
Dainotti, A.1
Pescap, A.2
Ventre, G.3
-
20
-
-
33751110003
-
Wavelet based Denial-of-Service detection
-
Carl G., Brooks R. R., Rai S., Wavelet based Denial-of-Service detection Computers and Security 2006 25 8 600 615
-
(2006)
Computers and Security
, vol.25
, Issue.8
, pp. 600-615
-
-
Carl, G.1
Brooks, R.R.2
Rai, S.3
-
22
-
-
35148840623
-
Detecting Denial-of-Service attacks using the wavelet transform
-
Hamdi M., Boudriga N., Detecting Denial-of-Service attacks using the wavelet transform Computer Communications 2007 30 16 3203 3213
-
(2007)
Computer Communications
, vol.30
, Issue.16
, pp. 3203-3213
-
-
Hamdi, M.1
Boudriga, N.2
-
23
-
-
45149104919
-
The identification and correction of outline based on wavelet transformation of traffic flow
-
Liu B., Li Y., Hou Y., Sui X., The identification and correction of outline based on wavelet transformation of traffic flow Proceedings of the International Conference on Wavelet Analysis and Pattern Recognition November 2007 Beijing, China 2 4
-
(2007)
Proceedings of the International Conference on Wavelet Analysis and Pattern Recognition
, pp. 2-4
-
-
Liu, B.1
Li, Y.2
Hou, Y.3
Sui, X.4
-
24
-
-
33646900187
-
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
-
Li M., Change trend of averaged Hurst parameter of traffic under DDOS flood attacks Computers and Security 2006 25 3 213 220
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 213-220
-
-
Li, M.1
-
26
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee W., Fan W., Miller M., Stolfo S. J., Zadok E., Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security 2002 10 1-2 5 22
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
28
-
-
0004255876
-
-
2nd Upper Saddle River, NJ, USA Prentice Hall
-
Astrom K. J., Adaptive Control 1994 2nd Upper Saddle River, NJ, USA Prentice Hall
-
(1994)
Adaptive Control
-
-
Astrom, K.J.1
-
32
-
-
77953503777
-
Variance bound of ACF estimation of one block of fGn with LRD
-
Li M., Zhao W., Variance bound of ACF estimation of one block of fGn with LRD Mathematical Problems in Engineering 2010 2010 14
-
(2010)
Mathematical Problems in Engineering
, vol.2010
, pp. 14
-
-
Li, M.1
Zhao, W.2
-
33
-
-
77149127074
-
Generation of teletraffic of generalized Cauchy type
-
Li M., Generation of teletraffic of generalized Cauchy type Physica Scripta 2010 81 2 10
-
(2010)
Physica Scripta
, vol.81
, Issue.2
, pp. 10
-
-
Li, M.1
-
34
-
-
77953522545
-
On the predictability of long-range dependent series
-
Li M., Li J.-Y., On the predictability of long-range dependent series Mathematical Problems in Engineering 2010 2010 9
-
(2010)
Mathematical Problems in Engineering
, vol.2010
, pp. 9
-
-
Li, M.1
Li, J.-Y.2
-
35
-
-
39649123983
-
Modeling network traffic using generalized Cauchy process
-
Li M., Lim S. C., Modeling network traffic using generalized Cauchy process Physica A 2008 387 11 2584 2594
-
(2008)
Physica A
, vol.387
, Issue.11
, pp. 2584-2594
-
-
Li, M.1
Lim, S.C.2
-
36
-
-
48249114460
-
Investigating multi-fractality of network traffic using local Hurst function
-
Li M., Lim S. C., Zhao W., Investigating multi-fractality of network traffic using local Hurst function Advanced Studies in Theoretical Physics 2008 2 10 479 490
-
(2008)
Advanced Studies in Theoretical Physics
, vol.2
, Issue.10
, pp. 479-490
-
-
Li, M.1
Lim, S.C.2
Zhao, W.3
-
37
-
-
33750845321
-
Modeling autocorrelation functions of long-range dependent teletraffic series based on optimal approximation in Hilbert spacea further study
-
Li M., Modeling autocorrelation functions of long-range dependent teletraffic series based on optimal approximation in Hilbert spacea further study Applied Mathematical Modelling 2007 31 3 625 631
-
(2007)
Applied Mathematical Modelling
, vol.31
, Issue.3
, pp. 625-631
-
-
Li, M.1
-
38
-
-
33846089371
-
A rigorous derivation of power spectrum of fractional Gaussian noise
-
Li M., Lim S. C., A rigorous derivation of power spectrum of fractional Gaussian noise Fluctuation and Noise Letters 2006 6 4 C33 C36
-
(2006)
Fluctuation and Noise Letters
, vol.6
, Issue.4
-
-
Li, M.1
Lim, S.C.2
-
39
-
-
33644902936
-
A generalized Cauchy process and its application to relaxation phenomena
-
Lim S. C., Li M., A generalized Cauchy process and its application to relaxation phenomena Journal of Physics A 2006 39 12 2935 2951
-
(2006)
Journal of Physics A
, vol.39
, Issue.12
, pp. 2935-2951
-
-
Lim, S.C.1
Li, M.2
-
40
-
-
34547313503
-
Locally self-similar fractional oscillator processes
-
Lim S. C., Li M., Teo L. P., Locally self-similar fractional oscillator processes Fluctuation and Noise Letters 2007 7 2 L169 L179
-
(2007)
Fluctuation and Noise Letters
, vol.7
, Issue.2
-
-
Lim, S.C.1
Li, M.2
Teo, L.P.3
-
41
-
-
52349118652
-
Langevin equation with two fractional orders
-
Lim S. C., Li M., Teo L. P., Langevin equation with two fractional orders Physics Letters A 2008 372 42 6309 6320
-
(2008)
Physics Letters A
, vol.372
, Issue.42
, pp. 6309-6320
-
-
Lim, S.C.1
Li, M.2
Teo, L.P.3
-
42
-
-
77950968174
-
Forward for the special issue on traffic modeling, its computations and applications
-
Li M., Borgnat P., Forward for the special issue on traffic modeling, its computations and applications Telecommunication Systems 2010 43 3-4 145 146
-
(2010)
Telecommunication Systems
, vol.43
, Issue.3-4
, pp. 145-146
-
-
Li, M.1
Borgnat, P.2
-
43
-
-
77951023690
-
Correlation matching method for the weak stationarity test ofLRD traffic
-
Li M., Chen W.-S., Han L., Correlation matching method for the weak stationarity test ofLRD traffic Telecommunication Systems 2010 43 3-4 181 195
-
(2010)
Telecommunication Systems
, vol.43
, Issue.3-4
, pp. 181-195
-
-
Li, M.1
Chen, W.-S.2
Han, L.3
-
44
-
-
77951025628
-
Power spectrum of generalized Cauchy process
-
Li M., Lim S. C., Power spectrum of generalized Cauchy process Telecommunication Systems 2010 43 3-4 219 222
-
(2010)
Telecommunication Systems
, vol.43
, Issue.3-4
, pp. 219-222
-
-
Li, M.1
Lim, S.C.2
-
45
-
-
52949093292
-
-
Hackensack, NJ, USA World Scientific Series on Advances in Mathematics for Applied Sciences
-
Cattani C., Rushchitsky J., Wavelet and Wave Analysis as Applied to Materials with Micro or Nanostructure 2007 74 Hackensack, NJ, USA World Scientific xii+458 Series on Advances in Mathematics for Applied Sciences
-
(2007)
Wavelet and Wave Analysis As Applied to Materials with Micro or Nanostructure
, vol.74
, pp. 458
-
-
Cattani, C.1
Rushchitsky, J.2
-
46
-
-
77950997359
-
Harmonic wavelet approximation of random, fractal and high frequency signals
-
Cattani C., Harmonic wavelet approximation of random, fractal and high frequency signals Telecommunication Systems 2010 43 3-4 207 217
-
(2010)
Telecommunication Systems
, vol.43
, Issue.3-4
, pp. 207-217
-
-
Cattani, C.1
-
48
-
-
79953287297
-
Application of periodized harmonic wavelets towards solution of eigenvalue problems for integral equations
-
Cattani C., Kudreyko A., Application of periodized harmonic wavelets towards solution of eigenvalue problems for integral equations Mathematical Problems in Engineering 2010 2010 8
-
(2010)
Mathematical Problems in Engineering
, vol.2010
, pp. 8
-
-
Cattani, C.1
Kudreyko, A.2
-
50
-
-
77951433186
-
Specific differential equations for generating pulse sequences
-
Toma G., Specific differential equations for generating pulse sequences Mathematical Problems in Engineering 2010 2010 11
-
(2010)
Mathematical Problems in Engineering
, vol.2010
, pp. 11
-
-
Toma, G.1
-
51
-
-
77951441305
-
Mathematical transform of traveling-wave equations and phase aspects of quantum interaction
-
Bakhoum E. G., Toma C., Mathematical transform of traveling-wave equations and phase aspects of quantum interaction Mathematical Problems in Engineering 2010 2010 15
-
(2010)
Mathematical Problems in Engineering
, vol.2010
, pp. 15
-
-
Bakhoum, E.G.1
Toma, C.2
-
52
-
-
77951494646
-
Galerkin-Shannon of Debye's wavelet method for numerical solutions to the natural integral equations
-
Chen W. S., Galerkin-Shannon of Debye's wavelet method for numerical solutions to the natural integral equations International Journal of Engineering and Interdisciplinary Mathematics 2009 1 1 63 73
-
(2009)
International Journal of Engineering and Interdisciplinary Mathematics
, vol.1
, Issue.1
, pp. 63-73
-
-
Chen, W.S.1
-
53
-
-
76849104224
-
Harmonic wavelet method towards solution of the Fredholm type integral equations of the second kind
-
Cattani C., Kudreyko A., Harmonic wavelet method towards solution of the Fredholm type integral equations of the second kind Applied Mathematics and Computation 2010 215 12 4164 4171
-
(2010)
Applied Mathematics and Computation
, vol.215
, Issue.12
, pp. 4164-4171
-
-
Cattani, C.1
Kudreyko, A.2
|