-
1
-
-
84880212037
-
-
MyDoom virus. [Online]. Available
-
MyDoom virus. [Online]. Available: http://www. uscert. gov/cas/techalerts/TA04-028A. html
-
-
-
-
2
-
-
0038729330
-
Protection from distributed denial of service attacks using history-based ip filtering
-
May
-
T. Peng, K. R. mohanarao, and C. Leckie, "Protection from distributed denial of service attacks using history-based IP filtering, " in Proc. IEEE Int. Conf. Communications, May 2003, vol. 1, pp. 482-486.
-
(2003)
Proc. IEEE Int. Conf. Communications
, vol.1
, pp. 482-486
-
-
Peng, T.1
Mohanarao, K.R.2
Leckie, C.3
-
3
-
-
33845591142
-
Ddosresilient scheduling to counter application layer attacks under imperfect detection
-
Apr
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoSresilient scheduling to counter application layer attacks under imperfect detection, " in Proc. IEEE INFOCOM, Apr. 2006
-
(2006)
Proc. IEEE INFOCOM
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
4
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
-
Honolulu, Hawaii, USA, ACM
-
Jung J, Krishnamurthy B, Rabinovich M. "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites" //Proceedings of the 11th IEEE International World Wide Web Conference. Honolulu, Hawaii, USA, ACM, 2002: 252-262
-
(2002)
Proceedings of the 11th IEEE International World Wide Web Conference
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
5
-
-
61449197774
-
A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
-
FEBRUARY
-
Yi Xie, Shun-Zheng Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors, " in IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 1, FEBRUARY 2009
-
(2009)
IEEE/ACM TRANSACTIONS on NETWORKING
, vol.17
, Issue.1
-
-
Xie, Y.1
Yu, S.-Z.2
-
7
-
-
2942728016
-
Telling humans and computers apart automatically
-
February
-
L. von Ahn, M. Blum, and J. Langford, "Telling Humans and Computers Apart Automatically, " Communications of the ACM, vol. 47, no. 2, pp. 57-60, February 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.2
, pp. 57-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
8
-
-
78651588297
-
Securing web service by automatic robot detection
-
Boston, USA
-
Park K, Pai V, Lee K, Calo S. "Securing Web service by automatic robot detection" // Proceedings of the Annual Conference on USENIX 06 Annual Technical Conference. Boston, USA, 2006:23-28
-
(2006)
Proceedings of the Annual Conference on USENIX 06 Annual Technical Conference
, pp. 23-28
-
-
Park, K.1
Pai, V.2
Lee, K.3
Calo, S.4
-
9
-
-
84880232558
-
-
http://ita. ee. lbl. gov/html/contrib/EPA-HTTP. html
-
-
-
-
10
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
August 21-26, Philadelphia, Pennsylvania, USA
-
Anukool Lakhina et al, "Mining Anomalies Using Traffic Feature Distributions", SIGCOMM'05, August 21-26, 2005, Philadelphia, Pennsylvania, USA
-
(2005)
SIGCOMM'05
-
-
Lakhina, A.1
-
11
-
-
84904888755
-
Attacking ddos at the source
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source, " in Proc. Int. Conf. Network Protocols , 2002, pp. 312-321.
-
(2002)
Proc. Int. Conf. Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
12
-
-
21844462588
-
Distributed denial of service detection using tcp/ip header and traffic measurement analysis
-
Sappoo, Japan, Oct. 26-29
-
L. Limwiwatkul and A. Rungsawangr, "Distributed denial of service detection using TCP/IP header and traffic measurement analysis, " in Proc. Int. Symp. Commun. Inf. Technol. , Sappoo, Japan, Oct. 26-29, 2004, pp. 605-610.
-
(2004)
Proc. Int. Symp. Commun. Inf. Technol
, pp. 605-610
-
-
Limwiwatkul, L.1
Rungsawangr, A.2
-
15
-
-
0013094103
-
How to explain hierarchical clustering
-
University of South Carolina
-
Stephen P. Borgatti, "How to Explain Hierarchical Clustering", 1994 INSNA, 17(2):78-80, University of South Carolina.
-
1994 INSNA
, vol.17
, Issue.2
, pp. 78-80
-
-
Borgatti, S.P.1
|