-
1
-
-
61449207953
-
DDoS-Shield: DDOS-resilient scheduling to counter application layer attacks
-
Feb.
-
S. Ranjan, R. Swaminathan, M. Uysal and E. Knightly, "DDoS-Shield: DDOS-Resilient Scheduling to Counter Application Layer Attacks," IEEE/ACM Transactions on Networking, vol. 17, no.1, pp. 26-39, Feb. 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
3
-
-
33847761464
-
Non-gaussian and long memory statistical characterizations for internet traffic with anomalies
-
Mar.
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies," IEEE Trans. Dependable Secure Computing, vol. 4, no. 1, pp. 56-70, Mar. 2007.
-
(2007)
IEEE Trans. Dependable Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
4
-
-
79960618060
-
Browsing behavior mimicking attacks on popular web sites for large botnets
-
April.
-
S. Yu, G. Zhao, S. Guo, X. Yang, V. Athanasios, "Browsing behavior mimicking attacks on popular web sites for large botnets," IEEE INFOCOM Wksps, pp. 947-951, April. 2011.
-
(2011)
IEEE INFOCOM Wksps
, pp. 947-951
-
-
Yu, S.1
Zhao, G.2
Guo, S.3
Yang, X.4
Athanasios, V.5
-
5
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DdoS Problems," ACM Computing Survey, vol. 39, no. 1, pp. 123-128, 2007.
-
(2007)
ACM Computing Survey
, vol.39
, Issue.1
, pp. 123-128
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
6
-
-
33750366503
-
DDoS defense by offense
-
Oct.
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger and S. Shenker, "DDoS defense by offense,". ACM SIGCOMM Computer Communication Review, pp. 303-314, Oct. 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, pp. 303-314
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
7
-
-
84871990960
-
SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers
-
June.
-
J. Stanek, L. Kencl, "SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers," Communications (ICC), 2012 IEEE International Conference on. IEEE, pp. 6733-6738, June. 2012.
-
(2012)
Communications (ICC), 2012 IEEE International Conference On. IEEE
, pp. 6733-6738
-
-
Stanek, J.1
Kencl, L.2
-
8
-
-
47249148481
-
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
-
M. Srivatsa, A. Iyengar, J. Yin, et al, "Mitigating application-level denial of service attacks on Web servers: A client-transparent approach," ACM Transactions on the Web, vol. 3, no. 2, 15, 2008.
-
(2008)
ACM Transactions on the Web
, vol.3
, Issue.2
, pp. 15
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
-
9
-
-
84860543902
-
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
-
June.
-
S. Yu, W. Zhou, W. Jia, S. Guo, X. Yang, F. Tang, "Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 1073-1080, June. 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.6
, pp. 1073-1080
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Yang, X.5
Tang, F.6
-
10
-
-
77954302312
-
Detecting application denial-of-service attacks: A group-testing-based approach
-
Aug.
-
X. Ying, S. Incheol, MT. Thai, Z. Taieb, "Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach," IEEE Transactions on Parallel and Distributied System, vol. 21, no. 8, pp. 1203-1216, Aug. 2010.
-
(2010)
IEEE Transactions on Parallel and Distributied System
, vol.21
, Issue.8
, pp. 1203-1216
-
-
Ying, X.1
Incheol, S.2
Thai, M.T.3
Taieb, Z.4
-
11
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Feb.
-
Y. Xie, SZ. Yu, "A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors," IEEE/ACM Transactions on Networking, vol. 1, no. 17, pp. 54-65, Feb. 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.1
, Issue.17
, pp. 54-65
-
-
Xie, Y.1
Yu, S.Z.2
-
12
-
-
84874774889
-
A novel model for user clicks identification based on hidden semi-Markov
-
Mar.
-
C. Xu, C. Du, G. Zhao, S. Yu, "A novel model for user clicks identification based on hidden semi-Markov," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 791-798, Mar. 2013.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.2
, pp. 791-798
-
-
Xu, C.1
Du, C.2
Zhao, G.3
Yu, S.4
-
13
-
-
70450231541
-
Review-oriented metadata enrichment: A case study
-
L. Zhang, J. Wu, Y. Zhuang, et al, "Review-oriented metadata enrichment: A case study," Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries, pp. 173-182, 2009.
-
(2009)
Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries
, pp. 173-182
-
-
Zhang, L.1
Wu, J.2
Zhuang, Y.3
|