-
1
-
-
24944586818
-
Network based intrusion detection with support vector machines
-
LNCS 2662
-
Dong Seong Kim and Jong Son Park, "Network Based Intrusion Detection with Support Vector Machines", ICOIN 2003, LNCS 2662, pp 747-756.
-
ICOIN 2003
, pp. 747-756
-
-
Kim, D.S.1
Park, J.S.2
-
4
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
DOI 10.1016/j.jnca.2004.01.003, PII S1084804504000049, Computational Intelligence on the Internet
-
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, 'Intrusion Detection using an ensemble of Intelligent Paradigms', Journal of Network and Computer Applications, Volume 28, Issue 2 (April 2005) pp-167-182. (Pubitemid 40003209)
-
(2005)
Journal of Network and Computer Applications
, vol.28
, Issue.2
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
5
-
-
38549145516
-
Machine learning for automatic defence against distributed denial of service attacks
-
Stefan Seufert and Darragh O'Brien "Machine Learning for Automatic Defence against Distributed Denial of Service Attacks" ICC 2007
-
ICC 2007
-
-
Seufert, S.1
O'Brien, D.2
-
6
-
-
38549145516
-
Machine learning for automatic defence against distributed denial of service attacks
-
School of Computing, Dublin City University, Ireland
-
Stefan Seufert and Darragh O'Brien School of Computing, Dublin City University, Ireland "Machine Learning for Automatic Defence against Distributed Denial of Service Attacks", ICC 2007 proceedings.
-
ICC 2007 Proceedings
-
-
Seufert, S.1
O'Brien, D.2
-
7
-
-
27644590551
-
Data mining and machine learning - Towards reducing false positives in intrusion detection
-
DOI 10.1016/j.istr.2005.07.001, PII S1363412705000361
-
Tadeusz Pietraszek and Axel Tanner. "Data mining and machine learning-Towards reducing false positives in intrusion detection.", Information Security Technical Report, 10:, 2005, pp-169-183. (Pubitemid 41550376)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.3
, pp. 169-183
-
-
Pietraszek, T.1
Tanner, A.2
-
9
-
-
30344436961
-
Monitoring the macroscopic effect of DDoS flooding attacks
-
DOI 10.1109/TDSC.2005.50
-
Yuan. J and Mills. K, "Monitoring the macroscopic effect of DDos flooding attacks," IEEE Trans. Dependable and Secure Computing, vol.2, no. 4, Oct.-Dec. 2005, pp. 324-335. (Pubitemid 43060381)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.4
, pp. 324-335
-
-
Yuan, J.1
Mills, K.2
-
10
-
-
33646900187
-
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
-
DOI 10.1016/j.cose.2005.11.007, PII S0167404805001963
-
M. Li, "change trend of averaged Hurst parameter of traffic under DDOS flood attacks", Computers & Security, vol:25, no:3 May 2006, pp-213-220. (Pubitemid 43796072)
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 213-220
-
-
Li, M.1
-
11
-
-
8344244591
-
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
Oct.
-
M. Li, "An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition", Computers & Security, vol:23, no:7, Oct. 2004, pp-549-558.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
13
-
-
85069254734
-
-
http://en.wikipedia.org/wiki/Ddos#Distributedattack
-
-
-
-
14
-
-
85069243371
-
-
www.secure64.com
-
-
-
-
15
-
-
85069257341
-
-
http://themetricsystem.rjmetrics.com/2009/06/22/dos-attacks-trendtoward- politics/
-
-
-
|