-
1
-
-
84947911053
-
Managing flash crowds on the internet
-
Ari, I.; Hong, B.; Miller, E.; Brandt, S. Long, D. Managing Flash Crowds on the Internet. In: Proceedings of the 11TH IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS'03); 2003.
-
(2003)
Proceedings of the 11TH IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems (MASCOTS'03)
-
-
Ari, I.1
Hong, B.2
Miller, E.3
Brandt Long S, D.4
-
2
-
-
0031250567
-
Internet Web servers: Workload characterization and performance implications
-
M. Arlitt, and C. Williamson Internet Web servers: workload characterization and performance implications IEEE/ACM Transactions on Networking 5 5 1997 631 645
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.5
, pp. 631-645
-
-
Arlitt, M.1
Williamson, C.2
-
3
-
-
79957736179
-
Distributed denial of service attack detection using an ensemble of neural classifier
-
P. Arun Raj Kumar, and S. Selvakumar Distributed denial of service attack detection using an ensemble of neural classifier Computer Communications 34 11 2011 1328 1341
-
(2011)
Computer Communications
, vol.34
, Issue.11
, pp. 1328-1341
-
-
Arun Raj Kumar, P.1
Selvakumar, S.2
-
5
-
-
70449567512
-
Cost-volume-profit analysis under uncertainty: A model with fuzzy estimators based on confidence intervals
-
K.A. Chrysafis, and B.K. Papadopoulos Cost-volume-profit analysis under uncertainty: a model with fuzzy estimators based on confidence intervals International Journal of Production Research 47 21 2009
-
(2009)
International Journal of Production Research
, vol.47
, Issue.21
-
-
Chrysafis, K.A.1
Papadopoulos, B.K.2
-
6
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
C. Douligeris, and A. Mitrokotsa DDoS attacks and defense mechanisms: classification and state-of-the-art Computer Networks 44 5 2004 643 666
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
8
-
-
16644393989
-
Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
-
D. Gavrilis, and E. Dermatas Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features Computer Networks 48 2 2005 235 245
-
(2005)
Computer Networks
, vol.48
, Issue.2
, pp. 235-245
-
-
Gavrilis, D.1
Dermatas, E.2
-
11
-
-
0037592876
-
Empirical testing of the infinite source Poisson data traffic model
-
C.A. Guerin, H. Nyberg, O. Perrin, S. Resnick, H. Rootzen, and C. Starica Empirical testing of the infinite source Poisson data traffic model Stochastic Models 19 2 2003 151 200
-
(2003)
Stochastic Models
, vol.19
, Issue.2
, pp. 151-200
-
-
Guerin, C.A.1
Nyberg, H.2
Perrin, O.3
Resnick, S.4
Rootzen, H.5
Starica, C.6
-
12
-
-
66549110064
-
Cyberwar in Estonia and the middle east
-
A. Jenik Cyberwar in Estonia and the Middle East Network Security 2009 4 2009 4 6
-
(2009)
Network Security
, vol.2009
, Issue.4
, pp. 4-6
-
-
Jenik, A.1
-
14
-
-
34248169333
-
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
-
V. Katos Network intrusion detection: evaluating cluster, discriminant, and logit analysis Information Sciences 177 15 2007 3060 3073
-
(2007)
Information Sciences
, vol.177
, Issue.15
, pp. 3060-3073
-
-
Katos, V.1
-
16
-
-
33646899894
-
Real-time analysis of intrusion detection alerts via correlation
-
S. Lee, B. Chung, H. Kim, Y. Lee, C. Park, and H. Yoon Real-time analysis of intrusion detection alerts via correlation Computers & Security 25 3 2006 169 183
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 169-183
-
-
Lee, S.1
Chung, B.2
Kim, H.3
Lee, Y.4
Park, C.5
Yoon, H.6
-
18
-
-
0942298614
-
Decision analysis of statistically detecting distributed denial-of-service flooding attacks
-
M. Li, C.H. Chi, W. Jia, W. Zhao, W. Zhou, and J. Cao Decision analysis of statistically detecting distributed denial-of-service flooding attacks International Journal of Information Technology and Decision Making 2 3 2003 397 405
-
(2003)
International Journal of Information Technology and Decision Making
, vol.2
, Issue.3
, pp. 397-405
-
-
Li, M.1
Chi, C.H.2
Jia, W.3
Zhao, W.4
Zhou, W.5
Cao, J.6
-
20
-
-
51349102242
-
Inside the new coolstreaming: Principles, measurements and performance implications
-
B. Li, S. Xie, Y. Qu, G. Keung, D. Lin, and J. Liu Inside the new coolstreaming: principles, measurements and performance implications IEEE Infocom 2008
-
(2008)
IEEE Infocom
-
-
Li, B.1
Xie, S.2
Qu, Y.3
Keung, G.4
Lin, D.5
Liu, J.6
-
21
-
-
8344244591
-
An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition
-
M. Li An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition Computers and Security 23 7 2004 549 558
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
22
-
-
55049131898
-
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms
-
Y. Li, L. Guo, Z. Tian, and T. Lu A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms Computer Communications 31 2008 4018 4025
-
(2008)
Computer Communications
, vol.31
, pp. 4018-4025
-
-
Li, Y.1
Guo, L.2
Tian, Z.3
Lu, T.4
-
25
-
-
79952085525
-
DDoS detection technique using statistical analysis to generate Quick response time, International Conference on Broadband
-
S. Oshima, T. Nakashima, and T. Sueyoshi DDoS detection technique using statistical analysis to generate Quick response time, International Conference on Broadband Wireless Computing, Communication and Applications 2010 672 677
-
(2010)
Wireless Computing, Communication and Applications
, pp. 672-677
-
-
Oshima, S.1
Nakashima, T.2
Sueyoshi, T.3
-
26
-
-
77953504603
-
Capturing the elusive poissonity in web traffic
-
Park, C.; Shen, H.; Marron, J.S.; Hernandez-Campos, F.; Veitch, D. Capturing the elusive poissonity in web traffic. In: 14th IEEE International Symposium on modeling, analysis, and Simulation of Computer and Telecommunication systems, 2006. pp. 189-196.
-
(2006)
14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
, pp. 189-196
-
-
Park, C.1
Shen, H.2
Marron . J, S.3
Hernandez-Campos, F.4
Veitch, D.5
-
27
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 12 2007 3448 3470
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
28
-
-
0029323403
-
Wide area traffic: The failure of Poisson modeling
-
V. Paxson, and S. Floyd Wide area traffic: the failure of Poisson modeling IEEE/ACM Trans. on Networking 3 3 1995 226 244
-
(1995)
IEEE/ACM Trans. on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
30
-
-
24144485773
-
On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics
-
D. Rincón, and S. Sallent On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics Lecture Notes in Computer Science 3375 2005 110 123
-
(2005)
Lecture Notes in Computer Science
, vol.3375
, pp. 110-123
-
-
Rincón, D.1
Sallent, S.2
-
31
-
-
44049088453
-
Detecting VoIP floods using the Hellinger distance
-
H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia Detecting VoIP floods using the Hellinger distance IEEE Transactions on Parallel and Distributed Systems 19 6 2008 794 805
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.6
, pp. 794-805
-
-
Sengar, H.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
32
-
-
84865276449
-
A study of a botnet creation process and the impact of a DDoS attack against a web server
-
S.N. Shaeles, and I.D. Psaroudakis A study of a botnet creation process and the impact of a DDoS attack against a web server Hakin9 Extra - Botnets 2011 8 12 issue 5
-
(2011)
Hakin9 Extra - Botnets
, pp. 8-12
-
-
Shaeles, S.N.1
Psaroudakis, I.D.2
-
33
-
-
33745442482
-
A machine learning framework for network anomaly detection using SVM and GA
-
Shon T, Kim Y, Lee C, Jongsub M. A machine learning framework for network anomaly detection using SVM and GA, In: Proc. Of Systems, Man and Cybernetics (SMC) Information Assurance Workshop; 2005. pp. 176-183.
-
(2005)
Proc. of Systems, Man and Cybernetics (SMC) Information Assurance Workshop
, pp. 176-183
-
-
Shon, T.1
Kim, Y.2
Lee, C.3
Jongsub, M.4
-
37
-
-
48249144409
-
An intelligent method for real-time detection of DDoS attack based on fuzzy logic
-
J. Wang, and G. Yang An intelligent method for real-time detection of DDoS attack based on fuzzy logic Journal of Electronics (China) 25 4 2008 511 518
-
(2008)
Journal of Electronics (China)
, vol.25
, Issue.4
, pp. 511-518
-
-
Wang, J.1
Yang, G.2
-
39
-
-
33746639174
-
Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks
-
W. Wei, Y. Dong, D. Lu, and G. Jin Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks Lecture Notes in Computer Science, LNCS 3994 2006 57 64
-
(2006)
Lecture Notes in Computer Science, LNCS
, vol.3994
, pp. 57-64
-
-
Wei, W.1
Dong, Y.2
Lu, D.3
Jin, G.4
-
40
-
-
78650122734
-
Enhancing DDoS flood attack detection via intelligent fuzzy logic
-
Z. Xia, S. Lu, and J. Li Enhancing DDoS flood attack detection via intelligent fuzzy logic Informatica 34 2010 497 507
-
(2010)
Informatica
, vol.34
, pp. 497-507
-
-
Xia, Z.1
Lu, S.2
Li, J.3
-
41
-
-
33947660479
-
Covariance-matrix modeling and detecting various flooding attacks
-
D.S. Yeung, A. Jin, and X. Wang Covariance-matrix modeling and detecting various flooding attacks IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 37 2 2007
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
, vol.37
, Issue.2
-
-
Yeung, D.S.1
Jin, A.2
Wang, X.3
-
42
-
-
58149490850
-
Information theory based detection against network behavior mimicking DDoS attacks
-
S. Yu, W. Zhou, and R. Doss Information theory based detection against network behavior mimicking DDoS attacks IEEE Communications Letters 12 4 2008 318 324
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.4
, pp. 318-324
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
|