-
2
-
-
84864186488
-
Research on detection methods of CC attack
-
Z.L.C. Zhonghua and W. Xiaoming, "Research on Detection Methods of CC Attack," Telecomm. Science, pp. 62-65, 2009.
-
(2009)
Telecomm. Science
, pp. 62-65
-
-
Zhonghua, Z.L.C.1
Xiaoming, W.2
-
3
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, and E. Vazquez, "Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges," Computers and Security, vol. 28, nos. 1/2, pp. 18-28, 2009.
-
(2009)
Computers and Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
MacIa-Fernandez, G.3
Vazquez, E.4
-
5
-
-
74149089478
-
Hidden semi-markov models
-
S. Yu, "Hidden Semi-Markov Models," Artificial Intelligence, vol. 174, no. 2, pp. 215-243, 2010.
-
(2010)
Artificial Intelligence
, vol.174
, Issue.2
, pp. 215-243
-
-
Yu, S.1
-
6
-
-
57049166467
-
Measuring the normality of web proxies behavior based on locality principles
-
Y. Xie and S. Yu, "Measuring the Normality of Web Proxies Behavior Based on Locality Principles," Network and Parallel Computing, vol. 5245, pp. 61-73, 2008.
-
(2008)
Network and Parallel Computing
, vol.5245
, pp. 61-73
-
-
Xie, Y.1
Yu, S.2
-
7
-
-
79957530146
-
Low-rate ddos attacks detection and traceback by using new information metrics
-
June
-
Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDos Attacks Detection and Traceback by Using New Information Metrics," IEEE Trans. Information Forensics and Security, vol. 6, no. 2, pp. 426-437, June 2011.
-
(2011)
IEEE Trans. Information Forensics and Security
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
8
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Y. Yu, K. Li, W. Zhou, and P. Li, "Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures," J. Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.
-
(2012)
J. Network and Computer Applications
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
9
-
-
34147099073
-
Survey of network- based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network- Based Defense Mechanisms Countering the Dos and DDos Problems," ACM Computing Surveys, vol. 39, no. 1, p. 3, 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
10
-
-
78149435896
-
Mitigating application layer distributed denial of service attacks via effective trust management
-
Nov
-
J. Yu, C. Fang, L. Lu, and Z. Li, "Mitigating Application Layer Distributed Denial of Service Attacks via Effective Trust Management," IET Comm., vol. 4, no. 16, pp. 1952-1962, Nov. 2010.
-
(2010)
IET Comm
, vol.4
, Issue.16
, pp. 1952-1962
-
-
Yu, J.1
Fang, C.2
Lu, L.3
Li, Z.4
-
11
-
-
80052373792
-
An otp-based mechanism for defending application layer ddos attacks
-
X. Ye, W. Wen, Y. Ye, and Q. Cen, "An Otp-Based Mechanism for Defending Application Layer DDos Attacks," Applied Informatics and Comm., vol. 227, pp. 388-396, 2011.
-
(2011)
Applied Informatics and Comm
, vol.227
, pp. 388-396
-
-
Ye, X.1
Wen, W.2
Ye, Y.3
Cen, Q.4
-
12
-
-
84964247755
-
Sequence-order-independent network profiling for detecting application layer ddos attacks
-
S. Lee, G. Kim, and S. Kim, "Sequence-Order-Independent Network Profiling for Detecting Application Layer DDos Attacks," EURASIP J. Wireless Comm. and Networking, vol. 2011, no. 1, p. 50, 2011.
-
(2011)
EURASIP J. Wireless Comm. and Networking
, vol.2011
, Issue.1
, pp. 50
-
-
Lee, S.1
Kim, G.2
Kim, S.3
-
13
-
-
84860543902
-
Discriminating ddos attacks from flash crowds using flow correlation coefficient
-
June
-
S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, "Discriminating DDos Attacks from Flash Crowds Using Flow Correlation Coefficient," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, pp. 1073-1080, June 2012.
-
(2012)
IEEE Trans. Parallel and Distributed Systems
, vol.23
, Issue.6
, pp. 1073-1080
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
14
-
-
79551523280
-
Traceback of ddos attacks using entropy variations
-
Mar
-
S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of DDos Attacks Using Entropy Variations," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 3, pp. 412-425, Mar. 2011.
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
15
-
-
61449197774
-
A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
-
Feb
-
Y. Xie and S. Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 54-65, Feb. 2009.
-
(2009)
IEEE/ ACM Trans. Networking
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.2
-
16
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
Feb
-
Y. Xie and S.-Z. Yu, "Monitoring the Application-Layer DDoS Attacks for Popular Websites," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 15-25, Feb. 2009.
-
(2009)
IEEE/ ACM Trans. Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
17
-
-
0022685753
-
Continuously variable duration hidden Markov models for automatic speech recognition
-
S. Levinson, "Continuously Variable Duration Hidden Markov Models for Automatic Speech Recognition," Computer Speech and Language, vol. 1, no. 1, pp. 29-45, 1986. (Pubitemid 17552445)
-
(1986)
Computer Speech and Language
, vol.1
, Issue.1
, pp. 29-45
-
-
Levinson, S.E.1
-
18
-
-
0037278070
-
An efficient forward-backward algorithm for an explicit-duration hidden markov model
-
Jan
-
S.-Z. Yu and H. Kobayashi, "An Efficient Forward-Backward Algorithm for an Explicit-Duration Hidden Markov Model," IEEE Signal Processing Letters, vol. 10, no. 1, pp. 11-14, Jan. 2003.
-
(2003)
IEEE Signal Processing Letters
, vol.10
, Issue.1
, pp. 11-14
-
-
Yu, S.-Z.1
Kobayashi, H.2
-
19
-
-
67349258558
-
A new family of eighth-order iterative methods for solving nonlinear equations
-
W. Bi, Q. Wu, and H. Ren, "A New Family of Eighth-Order Iterative Methods for Solving Nonlinear Equations," Applied Math. and Computation, vol. 214, no. 1, pp. 236-245, 2009.
-
(2009)
Applied Math. and Computation
, vol.214
, Issue.1
, pp. 236-245
-
-
Bi, W.1
Wu, Q.2
Ren, H.3
-
20
-
-
21644435461
-
The locality principle
-
DOI 10.1145/1070838.1070856
-
P. Denning, "The Locality Principle," Comm. ACM, vol. 48, no. 7, pp. 19-24, 2005. (Pubitemid 40926361)
-
(2005)
Communications of the ACM
, vol.48
, Issue.7
, pp. 19-24
-
-
Denning, P.J.1
-
21
-
-
70349743894
-
Program locality analysis using reuse distance
-
Y. Zhong, X. Shen, and C. Ding, "Program Locality Analysis Using Reuse Distance," ACM Trans. Programming Languages and Systems, vol. 31, no. 6, p. 20, 2009.
-
(2009)
ACM Trans. Programming Languages and Systems
, vol.31
, Issue.6
, pp. 20
-
-
Zhong, Y.1
Shen, X.2
Ding, C.3
-
22
-
-
0030389392
-
Characterizing reference locality in the www
-
V. Almeida, A. Bestavros, M. Crovella, and A. de Oliveira, "Characterizing Reference Locality in the WWW," Proc. Fourth Int'l Conf. Parallel and Distributed Information Systems, pp. 92-103, 1996.
-
(1996)
Proc. Fourth Int'l Conf. Parallel and Distributed Information Systems
, pp. 92-103
-
-
Almeida, V.1
Bestavros, A.2
Crovella, M.3
De Oliveira, A.4
-
23
-
-
0034275825
-
Temporal locality and its impact on web proxy cache performance
-
A. Mahanti, D. Eager, and C. Williamson, "Temporal Locality and Its Impact on Web Proxy Cache Performance," Performance Evaluation, vol. 42, nos. 2/3, pp. 187-203, 2000.
-
(2000)
Performance Evaluation
, vol.42
, Issue.2-3
, pp. 187-203
-
-
Mahanti, A.1
Eager, D.2
Williamson, C.3
-
24
-
-
0014701246
-
Evaluation techniques for storage hierarchies
-
R. Mattson, J. Gecsei, D. Slutz, and I. Traiger, "Evaluation Techniques for Storage Hierarchies," IBM J. Research and Development, vol. 9, no. 2, pp. 78-117, 1970.
-
(1970)
IBM J. Research and Development
, vol.9
, Issue.2
, pp. 78-117
-
-
Mattson, R.1
Gecsei, J.2
Slutz, D.3
Traiger, I.4
-
25
-
-
70450219881
-
Data mining: Concepts, models, methods, and algorithms
-
M. Kantardzie and A. SRIVASTAVA, "Data Mining: Concepts, Models, Methods, and Algorithms," J. Computing and Information Science in Eng., vol. 5, p. 394, 2005.
-
(2005)
J. Computing and Information Science in Eng
, vol.5
, pp. 394
-
-
Kantardzie, M.1
Srivastava, A.2
-
30
-
-
84878517795
-
Microsoft battling botnets for control of computers
-
Microsoft, "Battling Botnets for Control of Computers, "Microsoft Security Intelligence Report, vol. 9, 2010.
-
(2010)
Microsoft Security Intelligence Report
, vol.9
-
-
-
31
-
-
84878516381
-
-
"DoSHTTP," http://www.socketsoft.net/, 2013.
-
(2013)
DoSHTTP
-
-
-
32
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
Feb
-
L. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
-
(1989)
Proc IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
33
-
-
0014599202
-
Maximum likelihood estimation of the parameters of the gamma distribution and their bias
-
S. Choi and R. Wette, "Maximum Likelihood Estimation of the Parameters of the Gamma Distribution and Their Bias," Technometrics, vol. 11, no. 4, pp. 683-690, 1969.
-
(1969)
Technometrics
, vol.11
, Issue.4
, pp. 683-690
-
-
Choi, S.1
Wette, R.2
|