-
2
-
-
42449088159
-
Intrusion detection in computer systems using multiple classifier systems
-
Corona, I., G. Giacinto and F. Roll, 2008. Intrusion detection in computer systems using multiple classifier systems. Stud. Comput. Intelhg., 126:91-113.
-
(2008)
Stud. Comput. Intelhg.
, vol.126
, pp. 91-113
-
-
Corona, I.1
Giacinto, G.2
Roll, F.3
-
3
-
-
77952411826
-
Passively monitoring networks at gigabit speeds using commodity hardware and open source software
-
October 2003, Miami FL.
-
Deri, L., 2003. Passively monitoring networks at gigabit speeds using commodity hardware and open source software. Proceedings of the Passive and Active Measurement Conference, October 2003, Miami FL., pp:1-7.
-
(2003)
Proceedings of the Passive and Active Measurement Conference
, pp. 1-7
-
-
Deri, L.1
-
4
-
-
79960863336
-
Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection
-
April 10-15, 2011, Shanghai, China
-
Gao J., W. Fan, D. Turaga, O. Verscheure, X. Meng, L. Su and J. Han, 2011. Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection. Proceedings of the 31st Annual IEEE International Conference on Computer Communications, April 10-15, 2011, Shanghai, China, pp:181-185.
-
(2011)
Proceedings of the 31st Annual IEEE International Conference on Computer Communications
, pp. 181-185
-
-
Gao, J.1
Fan, W.2
Turaga, D.3
Verscheure, O.4
Meng, X.5
Su, L.6
Han, J.7
-
5
-
-
77952384694
-
Principled reasoning and practical applications of alert fusion in intrusion detection systems
-
March 2011, Hong Kong
-
Gu, G., A. A. Cardenas and W. Lee, 2008. Principled reasoning and practical applications of alert fusion in intrusion detection systems. Proceedings of the ACM Symposium on Information, Computer and Communications Security, March 2011, Hong Kong, pp:136-147.
-
(2008)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
, pp. 136-147
-
-
Gu, G.1
Cardenas, A.A.2
Lee, W.3
-
6
-
-
70449428149
-
A trace measurement and analysis system for the multi-links CERMET backbone
-
July 28-30, 2009, Dalian, China
-
Guang, C, Y. Tang, J. Jiang and W. Ding, 2009. A trace measurement and analysis system for the multi-links CERMET backbone. Proceedings of the IEEE International Conference on Networking Architecture and Storage, July 28-30, 2009, Dalian, China, pp:341-346.
-
(2009)
Proceedings of the IEEE International Conference on Networking Architecture and Storage
, pp. 341-346
-
-
Guang, C.1
Tang, Y.2
Jiang, J.3
Ding, W.4
-
7
-
-
34548183355
-
A distributed approach using entropy to detect DDoS attacks in ISP domain
-
DOI 10.1109/ICSCN.2007.350758, 4156640, Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking
-
Kumar, K., R. C. Joshil and K. Singh, 2007. A distributed approach using entropy to detect DDoS attacks in ISP domain. Proceedings of the IEEE International Conference on Signal Processing, Communications and Networking, February 22-24, 2007, Chennai, India, pp:331-337. (Pubitemid 47304132)
-
(2007)
Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking
, pp. 331-337
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
8
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
DOI 10.1145/1090191.1080118
-
Lakhina, A., M. Crovella and C. Diot, 2005. Mining anomalies using traffic feature distributions. ACM Sigcomm Comput. Commnn. Rev., 35:217-228. (Pubitemid 46323506)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
October 2008, Vouliagmeni, Greece
-
Nychis, G., V. Sekar, D. G. Andersen, H. Kim and H. Zhang, 2008. An empirical evaluation of entropy-based traffic anomaly detection. Proceedings of the Internet Measurement Conference (IMC), October 2008, Vouliagmeni, Greece, pp:151-156.
-
(2008)
Proceedings of the Internet Measurement Conference (IMC)
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
10
-
-
71249129972
-
Flooding attacks detection and victim identification over high speed networks
-
August, 2009, Hammamet, Tunisia
-
Salem, O., A. Mehaoua, S. Vaton and A. Gravey, 2009. Flooding attacks detection and victim identification over high speed networks. Proceedings of the Global Information Infrastructure Symposium, August, 2009, Hammamet, Tunisia, pp:101-107.
-
(2009)
Proceedings of the Global Information Infrastructure Symposium
, pp. 101-107
-
-
Salem, O.1
Mehaoua, A.2
Vaton, S.3
Gravey, A.4
-
11
-
-
78049442821
-
-
Morgan and Claypool, Chicago, IL. USA.
-
Seni, G. and F. Elder, 2010. Ensemble Methods in Data Mining: Improving Accuracy through Combining Predictions. Morgan and Claypool, Chicago, IL. USA., pages:126.
-
(2010)
Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
, pp. 126
-
-
Seni, G.1
Elder, F.2
-
12
-
-
70349664554
-
Using renyi cross entropy to analyze traffic matrix and detect DDoS attacks
-
Yan, R. and Q. Zheng, 2009. Using renyi cross entropy to analyze traffic matrix and detect DDoS attacks. Inform. Technol. J., 8:1180-1188.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 1180-1188
-
-
Yan, R.1
Zheng, Q.2
-
13
-
-
84863136363
-
Hurst parameter for security evaluation of LAN traffic
-
Yan, R. and Y. Wang, 2012. Hurst parameter for security evaluation of LAN traffic. Inform. Technol. J., 11:269-275.
-
(2012)
Inform. Technol. J.
, vol.11
, pp. 269-275
-
-
Yan, R.1
Wang, Y.2
-
14
-
-
77954255664
-
Combining adaptive filtering and IF flows to detect DDoS attacks within a router
-
Yan, R., Q. Zheng and H. Li, 2010. Combining adaptive filtering and IF flows to detect DDoS attacks within a router. KSII Trans. Internet Inf. Syst, 4:428-451.
-
(2010)
KSII Trans. Internet Inf. Syst
, vol.4
, pp. 428-451
-
-
Yan, R.1
Zheng, Q.2
Li, H.3
|