-
1
-
-
84889006349
-
-
Arbor Networks 2012 Infrastructure Security Report, last accessed on April 2013
-
Arbor Networks, "2012 Infrastructure Security Report," http://tinyurl.com/ag6tht4, last accessed on April 2013
-
-
-
-
2
-
-
84888987715
-
-
Forbes Testing The Limits, LulzSec Takes Down CIA's Website, last accessed on March 2013
-
Forbes, "Testing The Limits, LulzSec Takes Down CIA's Website," http://tinyurl.com/bfhzbta, last accessed on March 2013
-
-
-
-
3
-
-
84889051445
-
-
PcWorld Hacker Arrested for DDoS Attacks on Amazon. com, last accessed on March 2013
-
PcWorld, "Hacker Arrested for DDoS Attacks on Amazon. com," http://tinyurl.com/d22myng, last accessed on March 2013
-
-
-
-
4
-
-
84888988380
-
-
ITPRO InfoSec 2011: Energy firms pummelled by DDoS attacks, last accessed on March 2013
-
ITPRO, "InfoSec 2011: Energy firms pummelled by DDoS attacks," http://tinyurl.com/cpqodbx, last accessed on March 2013
-
-
-
-
6
-
-
8344224137
-
Low-rate tcptargeted denial of service attacks: The shrew vs. The mice and elephants
-
A. Kuzmanovic and E. W. Knightly, "Low-rate tcptargeted denial of service attacks: the shrew vs. the mice and elephants," in Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2003
-
(2003)
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. ACM
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
7
-
-
84889057437
-
Cyber threat prediction model using security monitoring system event
-
Springer
-
N. Park and W. H. Park, "Cyber threat prediction model using security monitoring system event," in IT Convergence and Security 2012. Springer, 2013
-
(2013)
IT Convergence and Security 2012
-
-
Park, N.1
Park, W.H.2
-
9
-
-
84872083809
-
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
-
C. Fachkha, E. Bou-Harb, A. Boukhtouta, S. Dinh, F. Iqbal, and M. Debbabi, "Investigating the dark cyberspace: Profiling, threat-based analysis and correlation," in 7th International Conference on Risk and Security of Internet and Systems (CRiSIS). IEEE, 2012
-
(2012)
7th International Conference on Risk and Security of Internet and Systems (CRiSIS). IEEE
-
-
Fachkha, C.1
Bou-Harb, E.2
Boukhtouta, A.3
Dinh, S.4
Iqbal, F.5
Debbabi, M.6
-
10
-
-
74549174089
-
Arm-cpd: Detecting syn flooding attack by traffic prediction
-
S. Qibo, W. Shangguang, Y. Danfeng, and Y. Fangchun, "Arm-cpd: Detecting syn flooding attack by traffic prediction," in 2nd IEEE International Conference on Broadband Network Multimedia Technology, 2009
-
(2009)
2nd IEEE International Conference on Broadband Network Multimedia Technology
-
-
Qibo, S.1
Shangguang, W.2
Danfeng, Y.3
Fangchun, Y.4
-
11
-
-
84863931485
-
Cyber weather forecasting: Forecasting unknown internet worms using randomness analysis
-
Springer
-
H. Park, S.-O. D. Jung, H. Lee, and H. P. In, "Cyber weather forecasting: Forecasting unknown internet worms using randomness analysis," in Information Security and Privacy Research. Springer, 2012
-
(2012)
Information Security and Privacy Research
-
-
Park, H.1
Jung, S.-O.D.2
Lee, H.3
In, H.P.4
-
12
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity," ACM Transactions on Computer Systems (TOCS), 2006
-
(2006)
ACM Transactions on Computer Systems (TOCS)
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
13
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, D. Watson et al., "The internet motion sensor: A distributed blackhole monitoring system," in Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS), 2005
-
(2005)
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
14
-
-
35048867316
-
On the design and use of internet sinks for network abuse monitoring
-
E. Jonsson, A. Valdes, and M. Almgren, Eds. Springer Berlin / Heidelberg
-
V. Yegneswaran, P. Barford, and D. Plonka, "On the design and use of internet sinks for network abuse monitoring," in Recent Advances in Intrusion Detection, ser. Lecture Notes in Computer Science, E. Jonsson, A. Valdes, and M. Almgren, Eds. Springer Berlin / Heidelberg, 2004
-
(2004)
Recent Advances in Intrusion Detection, Ser. Lecture Notes in Computer Science
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
15
-
-
84889011748
-
-
Team Cymru-Community Services The Darknet Project, last accessed on April 2013
-
Team Cymru-Community Services, "The Darknet Project," http://www.cymru.com/Darknet, last accessed on April 2013
-
-
-
-
16
-
-
78650939601
-
Internet background radiation revisited
-
E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Huston, "Internet background radiation revisited," in Proceedings of the 10th annual conference on Internet measurement. ACM, 2010
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement. ACM
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
17
-
-
79951817047
-
Towards situational awareness of large-scale botnet probing events
-
Z. Li, A. Goyal, Y. Chen, and V. Paxson, "Towards situational awareness of large-scale botnet probing events," IEEE Transactions on Information Forensics and Security, 2011
-
(2011)
IEEE Transactions on Information Forensics and Security
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
Paxson, V.4
-
19
-
-
34547856203
-
Mosaic organization of dna nucleotides
-
C.-K. Peng, S. V. Buldyrev, S. Havlin, M. Simons, H. E. Stanley, and A. L. Goldberger, "Mosaic organization of DNA nucleotides," Phys. Rev. E, 1994
-
(1994)
Phys. Rev. e
-
-
Peng, C.-K.1
Buldyrev, S.V.2
Havlin, S.3
Simons, M.4
Stanley, H.E.5
Goldberger, A.L.6
-
21
-
-
42649096636
-
Time and scale hurst exponent analysis for financial markets
-
J. Matos, S. Gama, H. Ruskin, A. Sharkasi, and M. Crane, "Time and scale hurst exponent analysis for financial markets," Physica A: Statistical Mechanics and its Applications, 2008
-
(2008)
Physica A: Statistical Mechanics and Its Applications
-
-
Matos, J.1
Gama, S.2
Ruskin, H.3
Sharkasi, A.4
Crane, M.5
-
22
-
-
0035395850
-
Effect of trends on detrended fluctuation analysis
-
K. Hu, P. Ivanov, Z. Chen, P. Carpena, and H. Stanley, "Effect of trends on detrended fluctuation analysis," Physical Review E, 2001
-
(2001)
Physical Review e
-
-
Hu, K.1
Ivanov, P.2
Chen, Z.3
Carpena, P.4
Stanley, H.5
-
23
-
-
67249104170
-
Correlation among piecewise unwanted traffic time series
-
K. Fukuda, T. Hirotsu, O. Akashi, and T. Sugawara, "Correlation among piecewise unwanted traffic time series," in Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE, 2008
-
(2008)
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE
-
-
Fukuda, K.1
Hirotsu, T.2
Akashi, O.3
Sugawara, T.4
-
24
-
-
64249091076
-
Network traffic modeling and prediction with arima/garch
-
B. Zhou, D. He, Z. Sun, and W. H. Ng, "Network traffic modeling and prediction with arima/garch," in HET-NETs 06 Conference. Citeseer, 2005
-
(2005)
HET-NETs 06 Conference. Citeseer
-
-
Zhou, B.1
He, D.2
Sun, Z.3
Ng, W.H.4
-
25
-
-
34848890319
-
A weighted moving average-based approach for cleaning sensor data
-
Y. Zhuang, L. Chen, X. Wang, and J. Lian, "A weighted moving average-based approach for cleaning sensor data," in 27th International Conference on Distributed Computing Systems ICDCS, 2007
-
(2007)
27th International Conference on Distributed Computing Systems ICDCS
-
-
Zhuang, Y.1
Chen, L.2
Wang, X.3
Lian, J.4
-
26
-
-
0008621673
-
Design and use of the microsoft excel solver
-
D. Fylstra, L. Lasdon, J. Watson, and A. Waren, "Design and use of the microsoft excel solver," Interfaces, vol. 28, no. 5, 1998
-
(1998)
Interfaces
, vol.28
, Issue.5
-
-
Fylstra, D.1
Lasdon, L.2
Watson, J.3
Waren, A.4
-
27
-
-
0042816476
-
How rewarding is technical analysis? Evidence from singapore stock market
-
W.-K. Wong, M. Manzur, and B.-K. Chew, "How rewarding is technical analysis? evidence from singapore stock market," Applied Financial Economics, vol. 13, no. 7, 2003
-
(2003)
Applied Financial Economics
, vol.13
, Issue.7
-
-
Wong, W.-K.1
Manzur, M.2
Chew, B.-K.3
-
28
-
-
84889019849
-
-
The University of Texas at Austin Time Series and Forecasting, 2002, last accessed on April 2013
-
The University of Texas at Austin, "Time Series and Forecasting," http://tinyurl.com/bsxscwx, 2002, last accessed on April 2013
-
-
-
-
29
-
-
34250173478
-
Evaluation of short-term traffic forecasting algorithms in wireless networks
-
M. Papadopouli, E. Raftopoulos, and H. Shen, "Evaluation of short-term traffic forecasting algorithms in wireless networks," in 2nd Conference onNext Generation Internet Design and Engineering, NGI. IEEE, 2006
-
(2006)
2nd Conference OnNext Generation Internet Design and Engineering, NGI. IEEE
-
-
Papadopouli, M.1
Raftopoulos, E.2
Shen, H.3
-
30
-
-
77956261937
-
Functional clustering and linear regression for peak load forecasting
-
A. Goia, C. May, and G. Fusai, "Functional clustering and linear regression for peak load forecasting," International Journal of Forecasting, vol. 26, no. 4, 2010
-
(2010)
International Journal of Forecasting
, vol.26
, Issue.4
-
-
Goia, A.1
May, C.2
Fusai, G.3
-
31
-
-
33947613028
-
Nonlinear, biophysically-informed speech pathology detection
-
M. Little, P. McSharry, I. Moroz, and S. Roberts, "Nonlinear, biophysically-informed speech pathology detection," in Acoustics, Speech and Signal Processing. ICASSP Proceedings., vol. 2, 2006.
-
(2006)
Acoustics, Speech and Signal Processing. ICASSP Proceedings.
, vol.2
-
-
Little, M.1
McSharry, P.2
Moroz, I.3
Roberts, S.4
|