-
1
-
-
24644453625
-
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
-
R. Jalili, F. Imani-Mehr, M. Amini, and H.-R. Shahriari, 2005, "Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks", Lecture Notes in Computer Science, Vol. 3439, pp. 192-203.
-
(2005)
Lecture Notes in Computer Science
, vol.3439
, pp. 192-203
-
-
Jalili, R.1
Imani-Mehr, F.2
Amini, M.3
Shahriari, H.-R.4
-
2
-
-
33745922681
-
A combined data mining approach for DDoS attack detection
-
M. Kim, H. Na, K. Chae, H. Bang, and J. Na, 2004, "A Combined Data Mining Approach for DDoS Attack Detection", Lecture Notes in Computer Science, Vol. 3090, pp. 943-950.
-
(2004)
Lecture Notes in Computer Science
, vol.3090
, pp. 943-950
-
-
Kim, M.1
Na, H.2
Chae, K.3
Bang, H.4
Na, J.5
-
3
-
-
16644393989
-
Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
-
D. Gavrilis and E. Dermatas, 2005, "Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features",Computer Networks, Vol. 48, pp. 235-245.
-
(2005)
Computer Networks
, vol.48
, pp. 235-245
-
-
Gavrilis, D.1
Dermatas, E.2
-
4
-
-
27144490740
-
Detecting anomalous network traffic with combined fuzzy-based approaches
-
H.T. He, X.N. Luo, and B.L. Liu, 2005, "Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches", Lecture Notes in Computer Science, Vol. 3645, pp. 433-442.
-
(2005)
Lecture Notes in Computer Science
, vol.3645
, pp. 433-442
-
-
He, H.T.1
Luo, X.N.2
Liu, B.L.3
-
5
-
-
9444289934
-
Computational intelligent techniques for detecting denial of service attacks
-
S. Mukkamala and A.H. Sung, 2004, "Computational Intelligent Techniques for Detecting Denial of Service Attacks", Lecture Notes in Artificial Intelligence, Vol. 3029, pp. 616-624.
-
(2004)
Lecture Notes in Artificial Intelligence
, vol.3029
, pp. 616-624
-
-
Mukkamala, S.1
Sung, A.H.2
-
6
-
-
33646900187
-
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
-
M. Li, 2006, "Change Trend of Averaged Hurst Parameter of Traffic under DDOS Flood Attacks", Computers and Security, Vol. 25, pp. 213-220.
-
(2006)
Computers and Security
, vol.25
, pp. 213-220
-
-
Li, M.1
-
7
-
-
8344244591
-
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
M. Li, 2004, "An Approach to Reliably Identifying Signs of DDOS Flood Attacks Based on LRD Traffic Pattern Recognition", Computers and Security, Vol. 23, No. 549-558.
-
(2004)
Computers and Security
, vol.23
, Issue.549-558
-
-
Li, M.1
-
8
-
-
3142512777
-
Detecting DDOS attack based on network self-similarity
-
Y. Xiang, Y. Lin, W.L. Lei, and S.J. Huang, 2004, "Detecting DDOS attack based on Network Self-Similarity", IEE Proceedings in Communication, Vol. 151, No.3, pp. 292-295.
-
(2004)
IEE Proceedings in Communication
, vol.151
, Issue.3
, pp. 292-295
-
-
Xiang, Y.1
Lin, Y.2
Lei, W.L.3
Huang, S.J.4
-
9
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, 2003, "Statistical Approaches to DDoS Attack Detection and Response", Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03).
-
(2003)
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03)
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
10
-
-
17444397467
-
DDoS attack detection and wavelets
-
L. Li and G. Lee, 2005, "DDoS Attack Detection and Wavelets", Telecommunication Systems, Vol. 28:3, No. 4, pp. 435-451.
-
(2005)
Telecommunication Systems
, vol.28
, Issue.3-4
, pp. 435-451
-
-
Li, L.1
Lee, G.2
-
11
-
-
35048886720
-
A novel DDoS attack detecting algorithm based on the continuous wavelet transform
-
X. Yang, Y. Liu, M. Zeng, and Y. Shi, 2004, "A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform", Lecture Notes in Computer Science, Vol. 3309, pp. 173-181.
-
(2004)
Lecture Notes in Computer Science
, vol.3309
, pp. 173-181
-
-
Yang, X.1
Liu, Y.2
Zeng, M.3
Shi, Y.4
-
12
-
-
35048886560
-
Detecting distributed denial of service (DDoS) attacks through inductive learning
-
S. Noh, C. Lee, K. Choi, and G. Jung, 2003, "Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning", Lecture Notes in Computer Science, Vol. 2690, pp. 286-295.
-
(2003)
Lecture Notes in Computer Science
, vol.2690
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
13
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
Y. Chen and K. Hwang, 2006, "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis", Parallel Distrib. Comput., Vol. 66, pp. 1137-1151.
-
(2006)
Parallel Distrib. Comput.
, vol.66
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
14
-
-
0000428263
-
Learning in the recurrent random neural network
-
E. Gelenbe, 1993, "Learning in the Recurrent Random Neural Network", Neural Computation, Vol. 5, pp. 154-164.
-
(1993)
Neural Computation
, vol.5
, pp. 154-164
-
-
Gelenbe, E.1
-
16
-
-
1642617444
-
The Hurst exponent over time: Testing the assertion that emerging markets are becoming more efficient
-
D.O. Cajueiro and B.M. Tabak, 2004, "The Hurst Exponent over Time:Testing the Assertion That Emerging Markets Are Becoming More Efficient", Physica A, Vol. 336, pp. 521-537.
-
(2004)
Physica A
, vol.336
, pp. 521-537
-
-
Cajueiro, D.O.1
Tabak, B.M.2
-
17
-
-
0003922190
-
-
John-Wiley and Sons
-
R.O. Duda, P.E. Hart, and D.G. Stork, 2001, Pattern Classification, pp. 20-214, John-Wiley and Sons.
-
(2001)
Pattern Classification
, pp. 20-214
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
19
-
-
0030270532
-
Low bit-rate video compression with neural networks and temporal subsampling
-
C. Cramer, E. Gelenbe, and H. Bakircioglu, 1996, "Low bit-rate video compression with neural networks and temporal subsampling", Proc. IEEE, Vol. 84, No. 6, pp. 1529-1543.
-
(1996)
Proc. IEEE
, vol.84
, Issue.6
, pp. 1529-1543
-
-
Cramer, C.1
Gelenbe, E.2
Bakircioglu, H.3
-
20
-
-
33746488814
-
Texture classification and retrieval using the random neural network model
-
A. Teke and V. Atalay, 2006 "Texture Classification and Retrieval Using the Random Neural Network Model", Computational Management Science, Vol. 3(3), pp. 193-205.
-
(2006)
Computational Management Science
, vol.3
, Issue.3
, pp. 193-205
-
-
Teke, A.1
Atalay, V.2
-
21
-
-
0010358535
-
Minimum cost graph covering with the random neural network
-
O. Balci, R. Sharda, S. Zenios (Eds.), Pergamon Press, New York
-
E. Gelenbe and F. Batty, 1992, "Minimum cost graph covering with the random neural network", in: O. Balci, R. Sharda, S. Zenios (Eds.), Computer Science and Operations Research, Pergamon Press, New York, pp. 139-147.
-
(1992)
Computer Science and Operations Research
, pp. 139-147
-
-
Gelenbe, E.1
Batty, F.2
-
22
-
-
33846630543
-
Cognitive packet networks: QoS and performance
-
ISSN: 1526-7539, ISBN: 0-7695-1840-0
-
E. Gelenbe, R. Lent, A. Montuori, and Z. Xu, 2002, "Cognitive packet networks: QoS and performance", Proc. MASCOTS 2002, Modeling, Analysis and Simulation of Computer and Telecommunications Systems, pp. 3-9, ISSN: 1526-7539, ISBN: 0-7695-1840-0.
-
(2002)
Proc. MASCOTS 2002, Modeling, Analysis and Simulation of Computer and Telecommunications Systems
, pp. 3-9
-
-
Gelenbe, E.1
Lent, R.2
Montuori, A.3
Xu, Z.4
-
24
-
-
84871013073
-
-
UCLA CSD packet traces: http://www.lasr.cs.ucla.edu/ddos/traces/public/ usc/.
-
UCLA CSD Packet Traces
-
-
-
25
-
-
33745444330
-
An autonomic approach to denial of service defence
-
Taormina, Italy
-
E. Gelenbe, M. Gellman, G. Loukas, 2005, "An autonomic approach to denial of service defence", Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Vol. 2, pp. 537-541, Taormina, Italy.
-
(2005)
Proceedings of the IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
, vol.2
, pp. 537-541
-
-
Gelenbe, E.1
Gellman, M.2
Loukas, G.3
-
26
-
-
33846199593
-
Self-aware approach to denial of service defence
-
E. Gelenbe and G. Loukas, 2007, "Self-Aware Approach to Denial of Service Defence", Computer Networks: Special Issue on Security through Self-Protecting and Self-Healing Systems, Vol. 51(5), pp. 1299-1314.
-
(2007)
Computer Networks: Special Issue on Security Through Self-Protecting and Self-Healing Systems
, vol.51
, Issue.5
, pp. 1299-1314
-
-
Gelenbe, E.1
Loukas, G.2
|