-
2
-
-
4444317270
-
Defending Against an Internet-Based Attack on the Physical World
-
Byers S, Robin AD, Kormann D (2004) Defending Against an Internet-Based Attack on the Physical World. ACM Trans Internet Technol 4(3): 239-254.
-
(2004)
ACM Trans Internet Technol
, vol.4
, Issue.3
, pp. 239-254
-
-
Byers, S.1
Robin, A.D.2
Kormann, D.3
-
3
-
-
71049118997
-
DDoS attack detection algorithm using IP address features
-
Cheng J, Yin J, Liu Y, Cai Z, Li M (2009) DDoS attack detection algorithm using IP address features. In: Proceedings of Third International Workshop, Hefei, China, pp 207-215.
-
(2009)
In: Proceedings of Third International Workshop, Hefei, China
, pp. 207-215
-
-
Cheng, J.1
Yin, J.2
Liu, Y.3
Cai, Z.4
Li, M.5
-
4
-
-
84897968877
-
Intelligent reconfigurable method of cloud computing resources for multimedia data delivery
-
Choi J, Choi C, Yim K, Kim J, Kim P (2013) Intelligent reconfigurable method of cloud computing resources for multimedia data delivery. Informatica 24(3): 381-394.
-
(2013)
Informatica
, vol.24
, Issue.3
, pp. 381-394
-
-
Choi, J.1
Choi, C.2
Yim, K.3
Kim, J.4
Kim, P.5
-
5
-
-
84875643815
-
An intelligent security architecture for distributed firewalling environments
-
De Santis A, Castiglione A, Fiore U, Palmieri F (2013) An intelligent security architecture for distributed firewalling environments. J Ambient Intell Humaniz Comput 4(2): 223-234.
-
(2013)
J Ambient Intell Humaniz Comput
, vol.4
, Issue.2
, pp. 223-234
-
-
De Santis, A.1
Castiglione, A.2
Fiore, U.3
Palmieri, F.4
-
6
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
Garber L (2000) Denial-of-service attacks rip the Internet. IEEE Comput 33(4): 12-17.
-
(2000)
IEEE Comput
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
7
-
-
84892669628
-
IT2FS-based ontology with soft-computing mechanism for malware behavior analysis
-
Huang HD, Lee CS, Wang MH, Kao HY (2014) IT2FS-based ontology with soft-computing mechanism for malware behavior analysis. Soft Comput 18(2): 267-284.
-
(2014)
Soft Comput
, vol.18
, Issue.2
, pp. 267-284
-
-
Huang, H.D.1
Lee, C.S.2
Wang, M.H.3
Kao, H.Y.4
-
9
-
-
56349085999
-
Google's MapReduce programming model-Revisited
-
Lammel R (2008) Google's MapReduce programming model-Revisited. Sci Comput Program 70(1): 1-30.
-
(2008)
Sci Comput Program
, vol.70
, Issue.1
, pp. 1-30
-
-
Lammel, R.1
-
10
-
-
84875670442
-
Preserving quality of service for normal users against DDoS attacks by using double check priority queues
-
Lin CH, Lin HY, Wu TW, Chen YH, Huang CH (2013) Preserving quality of service for normal users against DDoS attacks by using double check priority queues. J Ambient Intell Humaniz Comput 4(2): 1-8.
-
(2013)
J Ambient Intell Humaniz Comput
, vol.4
, Issue.2
, pp. 1-8
-
-
Lin, C.H.1
Lin, H.Y.2
Wu, T.W.3
Chen, Y.H.4
Huang, C.H.5
-
11
-
-
81255172277
-
A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques, intrusion tolerance and mitigation techniques
-
Mishra A, Gupta BB, Joshi RC (2011) A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques, intrusion tolerance and mitigation techniques. In: Proceedings of the 2011 European intelligence and security informatics conference, Athens, Greece, pp 286-289.
-
(2011)
In: Proceedings of the 2011 European intelligence and security informatics conference, Athens, Greece
, pp. 286-289
-
-
Mishra, A.1
Gupta, B.B.2
Joshi, R.C.3
-
12
-
-
40649126581
-
Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
-
Noh S, Jung G, Choi K, Lee C (2008) Compiling network traffic into rules using soft computing methods for the detection of flooding attacks. Appl Soft Comput 8(3): 1200-1210.
-
(2008)
Appl Soft Comput
, vol.8
, Issue.3
, pp. 1200-1210
-
-
Noh, S.1
Jung, G.2
Choi, K.3
Lee, C.4
-
15
-
-
78651487216
-
An intelligent decision-making system for flood monitoring from space
-
Vladimirova T, Yuhaniz S (2011) An intelligent decision-making system for flood monitoring from space. Soft Comput 15(1): 13-24.
-
(2011)
Soft Comput
, vol.15
, Issue.1
, pp. 13-24
-
-
Vladimirova, T.1
Yuhaniz, S.2
|