-
1
-
-
78650141756
-
-
http://www.cert.org.
-
-
-
-
2
-
-
8344244591
-
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
M. Li. An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. Computers & Security, 23(7): 549-558, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
4
-
-
0029323403
-
Wide area traffic: The failure of Poisson modeling
-
V. Paxson and S. Floyd. Wide area traffic: the failure of Poisson modeling. IEEE/ACM Transactions on Networking, 3(3): 226-244, 1995.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
6
-
-
34548609404
-
Network traffic analysis using singular value decomposition and multiscale transforms
-
C.S. Sastry, S. Rawat and A.K. Pujari. Network traffic analysis using singular value decomposition and multiscale transforms. Information Sciences, 177(23): 5275-5291, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.23
, pp. 5275-5291
-
-
Sastry, C.S.1
Rawat, S.2
Pujari, A.K.3
-
8
-
-
24144485773
-
On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics
-
D. Rincón and S. Sallent. On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics. LNCS, 3375: 110-123, 2005.
-
(2005)
LNCS
, vol.3375
, pp. 110-123
-
-
Rincón, D.1
Sallent, S.2
-
9
-
-
33751076582
-
A survey of application of fuzzy logic in intelligent transportation systems (ITS) and rural ITS
-
March
-
N. K. Swain. A survey of application of fuzzy logic in intelligent transportation systems (ITS) and rural ITS. In Proceedings of the IEEE Southeast Conference, March 2006.
-
(2006)
Proceedings of the IEEE Southeast Conference
-
-
Swain, N.K.1
-
10
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S.X. Wu and W. Banzhaf. The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing, 10: 1-35, 2010.
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
12
-
-
84902156141
-
Neuro-fuzzy systems: State-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence
-
A. Abraham. Neuro-fuzzy systems: State-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence. LNCS, 2084: 269-276, 2001.
-
(2001)
LNCS
, vol.2084
, pp. 269-276
-
-
Abraham, A.1
-
13
-
-
34547549173
-
A fuzzy classification model for online customers
-
A. Meier and N. Werro. A fuzzy classification model for online customers. Informatica, 31(2): 175-182, 2007.
-
(2007)
Informatica
, vol.31
, Issue.2
, pp. 175-182
-
-
Meier, A.1
Werro, N.2
-
14
-
-
23844513842
-
Computational intelligence in data mining
-
J. Abonyi and B. Feil. Computational intelligence in data mining. Informatica, 29(1): 3-12, 2005.
-
(2005)
Informatica
, vol.29
, Issue.1
, pp. 3-12
-
-
Abonyi, J.1
Feil, B.2
-
15
-
-
0036563760
-
Some approaches to information security of communication networks
-
S. Avdoshin and V. Serdiouk. Some approaches to information security of communication networks. Informatica, 26(1): 1-10, 2002.
-
(2002)
Informatica
, vol.26
, Issue.1
, pp. 1-10
-
-
Avdoshin, S.1
Serdiouk, V.2
-
16
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and stateof- the-art
-
C. Douligeris and A. Mitrokotsa. DDoS attacks and defense mechanisms: classification and stateof- the-art. Computer Networks, 44(5): 643-666, 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
17
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha and J. M. Park. An overview of anomaly detection techniques: existing solutions and latest technological trends. Computer Networks, 51(12): 3448-3470, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
18
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. García-Teodoro, J. Díaz-Verdejo and G. Maciá- Fernández. Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security, 28(1-2): 18-28, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
García-Teodoro, P.1
Díaz-Verdejo, J.2
MacIá- Fernández, G.3
-
19
-
-
17644372344
-
Self-similarity and long range dependence on the internet: A second look at the evidence, origins and implications
-
W.B. Gong, Y. Liu and V. Misra. Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications. Computer Networks, 48(3): 377-399, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.3
, pp. 377-399
-
-
Gong, W.B.1
Liu, Y.2
Misra, V.3
-
20
-
-
33646900187
-
Change trend of averaged Hurst parameter traffic under DDOS flood attacks
-
M. Li. Change trend of averaged Hurst parameter traffic under DDOS flood attacks. Computers & Security, 25(3): 213-220, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 213-220
-
-
Li, M.1
-
21
-
-
2442583303
-
The LoSS technique for detecting new denial of service attacks
-
Greensboro, NC, March
-
W.H. Allen and G.A. Marin. The LoSS technique for detecting new denial of service attacks. In Proceedings of IEEE South East Conference, Greensboro, NC, March 2004.
-
(2004)
Proceedings of IEEE South East Conference
-
-
Allen, W.H.1
Marin, G.A.2
-
22
-
-
0035246057
-
Online error detection through observation of traffic selfsimilarity
-
W. Schleifer and M. Männle. Online error detection through observation of traffic selfsimilarity. In Proceedings of the IEE Communications Conference, 148(1): 38-42, 2001.
-
(2001)
Proceedings of the IEE Communications Conference
, vol.148
, Issue.1
, pp. 38-42
-
-
Schleifer, W.1
Männle, M.2
-
24
-
-
48249144409
-
An intelligent method for real-time detection of DDoS attack based on fuzzy logic
-
J.T. Wang and G. Yang. An intelligent method for real-time detection of DDoS attack based on fuzzy logic. Journal of Electronics (China), 25(4): 511-518, 2008.
-
(2008)
Journal of Electronics (China)
, vol.25
, Issue.4
, pp. 511-518
-
-
Wang, J.T.1
Yang, G.2
-
25
-
-
17644410745
-
On the wavelet spectrum diagnostic for Hurst parameter estimation in the analysis of Internet traffic
-
S. Stoev, M. Taqqu and C. Park. On the wavelet spectrum diagnostic for Hurst parameter estimation in the analysis of Internet traffic. Computer Networks, 48(3): 423-445, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.3
, pp. 423-445
-
-
Stoev, S.1
Taqqu, M.2
Park, C.3
-
26
-
-
8444239367
-
Some results on the selfsimilarity property in communication networks
-
S. Song and K. Joseph. Some results on the selfsimilarity property in communication networks. IEEE Transactions on Communications, 52(10): 1636-1641, 2004.
-
(2004)
IEEE Transactions on Communications
, vol.52
, Issue.10
, pp. 1636-1641
-
-
Song, S.1
Joseph, K.2
-
27
-
-
0003203686
-
Statistics for long-memory processes
-
New York
-
J. Beran. Statistics for long-memory processes. Chapman & Hall, New York, 1994.
-
(1994)
Chapman & Hall
-
-
Beran, J.1
-
28
-
-
0031515592
-
Testing and locating variance change points with application to stock prices
-
J. Chen and A. Gupta. Testing and Locating Variance Change points with Application to Stock Prices. Journal of the American Statistical Association, 92: 739-747, 1997.
-
(1997)
Journal of the American Statistical Association
, vol.92
, pp. 739-747
-
-
Chen, J.1
Gupta, A.2
-
29
-
-
0036349135
-
A unified framework for understanding network traffic using independent wavelet models
-
June
-
X. Tian, J. Wu and C. Ji. A unified framework for understanding network traffic using independent wavelet models. In Proceedings of IEEE INFOCOM', June 2002.
-
(2002)
Proceedings of IEEE INFOCOM'
-
-
Tian, X.1
Wu, J.2
Ji, C.3
-
30
-
-
0000501589
-
Fractional Brownian motions fractional noises and applications
-
B. B. Mandelbrot and J. W. Van Ness. Fractional Brownian motions, fractional noises and applications. SIAM Review, 10(4): 422-437, 1968.
-
(1968)
SIAM Review
, vol.10
, Issue.4
, pp. 422-437
-
-
Mandelbrot, B.B.1
Van Ness, J.W.2
-
32
-
-
78650128578
-
-
http://www.cubinlab.ee.unimelb.edu.au/%7Edarryl
-
-
-
|