-
1
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools and countermeasures
-
Citeseer
-
S. M. Specht and R. B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures," Proc. of the 17th International Conference on Parallel and Distributed Computing Systems, Citeseer, 2004, pp. 543-550.
-
(2004)
Proc. of the 17th International Conference on Parallel and Distributed Computing Systems
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
-
2
-
-
0008723266
-
-
Department of Energy, Computer Incident Advisory (CIAC), Lawrence Livermore National Laboratory, Rev.1, UCRL-ID-136939
-
P. J. Criscuolo, "Distributed Denial of Service: Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319," Department of Energy Computer Incident Advisory (CIAC), Lawrence Livermore National Laboratory, Rev.1, UCRL-ID-136939, 2000.
-
(2000)
Distributed Denial of Service: Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319
-
-
Criscuolo, P.J.1
-
5
-
-
37349125374
-
DDoS attack detection method using cluster analysis
-
K. Lee, J. Kim, K. Kwon, Y. Han, and S. Kim, "DDoS Attack Detection Method Using Cluster Analysis," Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008.
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.3
, pp. 1659-1665
-
-
Lee, K.1
Kim, J.2
Kwon, K.3
Han, Y.4
Kim, S.5
-
7
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
C. Jin, H. Wang, and K. Shin, "Hop-count Filtering: An Effective Defense against Spoofed DDoS Traffic," Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 30-41.
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.3
-
9
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," Proc. of the USENIX Security Symposium, 2000.
-
(2000)
Proc. of the USENIX Security Symposium
-
-
Stone, R.1
-
10
-
-
0035361712
-
Network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network Support for IP Traceback," ACM/IEEE Transactions on Networking, vol. 9, no. 3, pp. 226-237, 2001.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
11
-
-
0038059205
-
IP traceback with deterministic packet marking
-
A. Belenky and N. Ansari, "IP Traceback with Deterministic Packet Marking," IEEE Communications Letters, vol. 7, no. 4, pp. 162-164, 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.4
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
12
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
Citeseer
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical Approaches to DDoS Attack Detection and Response," Proc. of the DARPA Information Survivability Conference and Exposition, vol. 1, Citeseer, 2003, pp. 303-314.
-
(2003)
Proc. of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
13
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Y. Liao and V. Vemuri, "Use of K-Nearest Neighbor Classifier for Intrusion Detection," Computers & Security, vol. 21, no. 5, pp. 439-448, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.2
-
15
-
-
16644393989
-
Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
-
D. Gavrilis and E. Dermatas, "Real-time Detection of Distributed Denial-of-service Attacks Using RBF Networks and Statistical Features," Computer Networks, vol. 48, no. 2, pp. 235-245, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.2
, pp. 235-245
-
-
Gavrilis, D.1
Dermatas, E.2
-
17
-
-
0033204902
-
An empirical comparison of four initialization methods for the K-means algorithm
-
J. Pena, J. Lozano, and P. Larranaga, "An Empirical Comparison of Four Initialization Methods for the K-means Algorithm," Pattern recognition letters, vol. 20, no. 10, pp. 1027-1040, 1999.
-
(1999)
Pattern Recognition Letters
, vol.20
, Issue.10
, pp. 1027-1040
-
-
Pena, J.1
Lozano, J.2
Larranaga, P.3
-
18
-
-
0036487280
-
The global K-means clustering algorithm
-
A. Likas, N. Vlassis, and J. J. Verbeek, "The Global K-means Clustering Algorithm," Pattern Recognition, vol. 36, no. 2, pp. 451-461, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 451-461
-
-
Likas, A.1
Vlassis, N.2
Verbeek, J.J.3
-
19
-
-
45549104169
-
Modified global K-means algorithm for minimum sumof- squares clustering problems
-
A. Bagirov, "Modified Global K-means Algorithm for Minimum Sumof- squares Clustering Problems," Pattern Recognition, vol. 41, no. 10, pp. 3192-3199, 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.10
, pp. 3192-3199
-
-
Bagirov, A.1
-
20
-
-
38749139222
-
Consensus unsupervised feature ranking from multiple views
-
Y. Hong, S. Kwong, Y. Chang, and Q. Ren, "Consensus Unsupervised Feature Ranking from Multiple Views," Pattern Recognition Letters, vol. 29, no. 5, pp. 595-602, 2008.
-
(2008)
Pattern Recognition Letters
, vol.29
, Issue.5
, pp. 595-602
-
-
Hong, Y.1
Kwong, S.2
Chang, Y.3
Ren, Q.4
-
21
-
-
1942451938
-
Feature selection for high-dimensional data: A fast correlation-based filter solution
-
L. Yu and H. Liu, "Feature Selection for High-dimensional Data: a Fast Correlation-based Filter Solution," Proc. of International Conference on Machine Learning, 2003, pp. 856-863.
-
(2003)
Proc. of International Conference on Machine Learning
, pp. 856-863
-
-
Yu, L.1
Liu, H.2
-
22
-
-
33745561205
-
An introduction to variable and feature selection
-
I. Guyon and A. Elisseeff, "An Introduction to Variable and Feature Selection," Journal of Machine Learning Research, vol. 3, pp. 1157-1182, 2003.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 1157-1182
-
-
Guyon, I.1
Elisseeff, A.2
-
23
-
-
0032044157
-
Information theoretic subset selection for neural network models
-
D. Sridhar, E. Bartlett, and R. Seagrave, "Information Theoretic Subset Selection for Neural Network Models," Computers & Chemical Engineering, vol. 22, no. 4-5, pp. 613-626, 1998.
-
(1998)
Computers & Chemical Engineering
, vol.22
, Issue.4-5
, pp. 613-626
-
-
Sridhar, D.1
Bartlett, E.2
Seagrave, R.3
-
25
-
-
27644509863
-
-
[On line]. Available
-
MIT Lincoln Laboratory. (2000). DARPA Intrusion Detection Scenario Specific Datasets [On line]. Available: http://www.ll.mit.edu/mission/ communications/ist/corpora/ideval/data/2000/LLS-DDOS-1.0.html.
-
(2000)
DARPA Intrusion Detection Scenario Specific Datasets
-
-
|