-
1
-
-
84885637369
-
Detecting denial of service by modeling web-sever behaviour
-
Luis Campo Giralte, Cristina Conde, Isaac Martin de Diego, and Enrique Cabello Detecting denial of service by modeling web-sever behaviour Comput Electr Eng 2012 < http://dx.doi.org/10.1016/j.compeleceng.2012.07.004 >
-
(2012)
Comput Electr Eng
-
-
Giralte, L.C.1
Conde, C.2
De Diego, I.M.3
Cabello, E.4
-
2
-
-
84865637442
-
Intrusion detection using reduced-size RNN based on feature grouping
-
M. Sheikhan, Z. Jadidi, and A. Farrokhi Intrusion detection using reduced-size RNN based on feature grouping Neural Comput Appl 21 6 2012 1185 1190
-
(2012)
Neural Comput Appl
, vol.21
, Issue.6
, pp. 1185-1190
-
-
Sheikhan, M.1
Jadidi, Z.2
Farrokhi, A.3
-
3
-
-
84858698273
-
Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
-
Pedro Casas, Johan Mazel, and Philippe Owezarski Unsupervised network intrusion detection systems: detecting the unknown without knowledge Comput Commun 35 7 2012 772 783
-
(2012)
Comput Commun
, vol.35
, Issue.7
, pp. 772-783
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
4
-
-
85015605825
-
Classification, clustering and intrusion detection system
-
Manish Joshi Classification, clustering and intrusion detection system Int J Eng Res Appl 2 2 2012 961 964
-
(2012)
Int J Eng Res Appl
, vol.2
, Issue.2
, pp. 961-964
-
-
Joshi, M.1
-
5
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
Taeshik Shon, and Jongsub Moon A hybrid machine learning approach to network anomaly detection Inform Sci 177 18 2007 3799 3821
-
(2007)
Inform Sci
, vol.177
, Issue.18
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
6
-
-
84885601013
-
Intrusion detection for wireless sensor network based on traffic prediction model
-
Han Zhijie, and Wang Ruchuang Intrusion detection for wireless sensor network based on traffic prediction model Phys Proc 25 2012 2072 2080
-
(2012)
Phys Proc
, vol.25
, pp. 2072-2080
-
-
Zhijie, H.1
Ruchuang, W.2
-
7
-
-
33947611595
-
Alive communication
-
Fogel Alan, and Garvey Andrea Alive communication Infant Behav Dev 30 2007 251 257
-
(2007)
Infant Behav Dev
, vol.30
, pp. 251-257
-
-
Alan, F.1
Andrea, G.2
-
8
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot Mining anomalies using traffic feature distributions Comput Commun Rev 35 4 2005 217 228
-
(2005)
Comput Commun Rev
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
70349121381
-
Effective DDoS attacks detection using generalized entropy metric
-
Li K, Zhou WL, Yu S, Dai B. Effective DDoS attacks detection using generalized entropy metric. In: Proceedings of the 9th international conference on algorithms and architectures for parallel processing, Taiwan; 2009. p. 266-80.
-
(2009)
Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, Taiwan
, pp. 266-280
-
-
Li, K.1
Zhou, W.L.2
Yu, S.3
Dai, B.4
-
10
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
Nychis G, Sekar V, Andersen DG. An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8th ACM SIGCOMM conference on internet measurement, Vouliagmeni, Greece; 2008. p. 151-6.
-
(2008)
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, Vouliagmeni, Greece
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
-
11
-
-
84861627481
-
Diagnosing traffic anomalies using a two-phase model
-
Bin Zhang, Jia-Hai Yang, Jian-Ping Wu, and Ying-Wu Zhu Diagnosing traffic anomalies using a two-phase model J Comput Sci Technol 27 2 2012 313 327
-
(2012)
J Comput Sci Technol
, vol.27
, Issue.2
, pp. 313-327
-
-
Zhang, B.1
Yang, J.-H.2
Wu, J.-P.3
Zhu, Y.-W.4
-
12
-
-
84867592401
-
Traffic anomaly detection using multi-dimensional entropy classification in backbone network
-
Zheng Liming, Zou Peng, Han Weihong, Li Aiping, and Jia Yan Traffic anomaly detection using multi-dimensional entropy classification in backbone network J Comput Res Dev 49 9 2012 1972 1981
-
(2012)
J Comput Res Dev
, vol.49
, Issue.9
, pp. 1972-1981
-
-
Liming, Z.1
Peng, Z.2
Weihong, H.3
Aiping, L.4
Yan, J.5
-
13
-
-
84861862730
-
A DoS detection method based on composition self-similarity
-
J.Q. Zhu, F. Fu, C.K. Kim, K.X. Yin, and Y.H. Liu A DoS detection method based on composition self-similarity KSII Transactions on Internet and Information Systems 6 5 2012 1463 1478
-
(2012)
KSII Transactions on Internet and Information Systems
, vol.6
, Issue.5
, pp. 1463-1478
-
-
Zhu, J.Q.1
Fu, F.2
Kim, C.K.3
Yin, K.X.4
Liu, Y.H.5
-
14
-
-
84873312171
-
Revealing network communities with a nonlinear programming method
-
Wenye Li Revealing network communities with a nonlinear programming method Inform Sci 229 2013 18 28
-
(2013)
Inform Sci
, vol.229
, pp. 18-28
-
-
Li, W.1
-
15
-
-
80052767824
-
-
Springer, 233 Spring Street, New York, NY 10013, United States
-
Palla G, Pollner P, Barabasi A, Vicsek T. Social group dynamics in networks: adaptive networks: theory, models and applications. Springer, 233 Spring Street, New York, NY 10013, United States; 2009.
-
(2009)
Social Group Dynamics in Networks: Adaptive Networks: Theory, Models and Applications
-
-
Palla, G.1
Pollner, P.2
Barabasi, A.3
Vicsek, T.4
-
16
-
-
33748203405
-
A real-time anomaly detection model based on sampling measurement in a high-speed network
-
Guang Cheng, Jian Gong, and Wei Ding A real-time anomaly detection model based on sampling measurement in a high-speed network J Software 49 3 2003 594 599
-
(2003)
J Software
, vol.49
, Issue.3
, pp. 594-599
-
-
Cheng, G.1
Gong, J.2
Ding, W.3
-
17
-
-
69249222599
-
A TCAM-based solution for integrated traffic anomaly detection and policy filtering
-
Z.J. Wang, H. Che, J.N. Cao, and J.S. Wang A TCAM-based solution for integrated traffic anomaly detection and policy filtering Comput Commun 32 17 2009 1893 1901
-
(2009)
Comput Commun
, vol.32
, Issue.17
, pp. 1893-1901
-
-
Wang, Z.J.1
Che, H.2
Cao, J.N.3
Wang, J.S.4
-
18
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Y. Xie, and S.Z. Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors IEEE ACM Trans Netw 17 1 2009 54 65
-
(2009)
IEEE ACM Trans Netw
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.Z.2
|