-
1
-
-
80455144626
-
Parametric differences between a real-world distributed denial-of-service attack and a flash event
-
Aug
-
S. Bhatia, G. Mohay, A. Tickle, and E. Ahmed, "Parametric differences between a real-world distributed denial-of-service attack and a flash event," in Availability, Reliability and Security (ARES), 2011 Sixth International Conference on, Aug 2011, pp. 210-217.
-
(2011)
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
, pp. 210-217
-
-
Bhatia, S.1
Mohay, G.2
Tickle, A.3
Ahmed, E.4
-
2
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
Feb
-
Y. Xie and S. zheng Yu, "Monitoring the application-layer ddos attacks for popular websites," Networking, IEEE/ACM Transactions on, vol. 17, no. 1, pp. 15-25, Feb 2009.
-
(2009)
Networking, IEEE/ACM Transactions on
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Zheng Yu, S.2
-
3
-
-
84927614782
-
Slowreq: A weapon for cyberwarfare operations. Characteristics, limits, performance, remediations
-
Springer
-
M. Aiello, G. Papaleo, and E. Cambiaso, "Slowreq: A weapon for cyberwarfare operations. characteristics, limits, performance, remediations," in International Joint Conference SOCO13-CISIS13-ICEUTE13. Springer, 2014, pp. 537-546.
-
(2014)
International Joint Conference SOCO13-CISIS13-ICEUTE13
, pp. 537-546
-
-
Aiello, M.1
Papaleo, G.2
Cambiaso, E.3
-
4
-
-
84889069472
-
Evaluating security controls against http-based ddos attacks
-
July
-
D. Moustis and P. Kotzanikolaou, "Evaluating security controls against http-based ddos attacks," in Information, Intelligence, Systems and Applications (IISA), 2013 Fourth International Conference on, July 2013, pp. 1-6.
-
(2013)
Information, Intelligence, Systems and Applications (IISA), 2013 Fourth International Conference on
, pp. 1-6
-
-
Moustis, D.1
Kotzanikolaou, P.2
-
5
-
-
79955041204
-
Lightweight ddos flooding attack detection using nox/openflow
-
Oct
-
R. Braga, E. Mota, and A. Passito, "Lightweight ddos flooding attack detection using nox/openflow," in Local Computer Networks (LCN), 2010 IEEE 35th Conference on, Oct 2010, pp. 408-415.
-
(2010)
Local Computer Networks (LCN), 2010 IEEE 35th Conference on
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
6
-
-
77950993448
-
Trawling traffic under attack, overcoming ddos attacks by target-controlled traffic filtering
-
Dec
-
S. Dolev, Y. Elovici, A. Kesselman, and P. Zilberman, "Trawling traffic under attack, overcoming ddos attacks by target-controlled traffic filtering," in Parallel and Distributed Computing, Applications and Technologies, 2009 International Conference on, Dec 2009, pp. 336-341.
-
(2009)
Parallel and Distributed Computing, Applications and Technologies, 2009 International Conference on
, pp. 336-341
-
-
Dolev, S.1
Elovici, Y.2
Kesselman, A.3
Zilberman, P.4
-
7
-
-
84856195867
-
Detection dos attack on fpga using fuzzy association rules
-
Nov
-
T. Tuncer and Y. Tatar, "Detection dos attack on fpga using fuzzy association rules," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, Nov 2011, pp. 1271-1276.
-
(2011)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
, pp. 1271-1276
-
-
Tuncer, T.1
Tatar, Y.2
-
9
-
-
84920518595
-
Slow dos attacks: Definition and categorisation
-
E. Cambiaso, G. Papaleo, G. Chiola, and M. Aiello, "Slow dos attacks: definition and categorisation," International Journal of Trust Management in Computing and Communications, vol. 1, no. 3, pp. 300-319, 2013.
-
(2013)
International Journal of Trust Management in Computing and Communications
, vol.1
, Issue.3
, pp. 300-319
-
-
Cambiaso, E.1
Papaleo, G.2
Chiola, G.3
Aiello, M.4
-
10
-
-
84885637369
-
Detecting denial of service by modelling web-server behaviour
-
L. C. Giralte, C. Conde, I. M. De Diego, and E. Cabello, "Detecting denial of service by modelling web-server behaviour," Computers & Electrical Engineering, vol. 39, no. 7, pp. 2252-2262, 2013.
-
(2013)
Computers & Electrical Engineering
, vol.39
, Issue.7
, pp. 2252-2262
-
-
Giralte, L.C.1
Conde, C.2
De Diego, I.M.3
Cabello, E.4
-
12
-
-
84931067566
-
Security Assessment of the Transmission Control Protocol (TCP)
-
F. Gont, Security Assessment of the Transmission Control Protocol (TCP), Internet Engineering Task Force (IETF), 01 2001.
-
(2001)
Internet Engineering Task Force (IETF)
, vol.1
-
-
Gont, F.1
-
13
-
-
77955469676
-
An overview of ip flow-based intrusion detection
-
IEEE, Third
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller, "An overview of ip flow-based intrusion detection," Communications Surveys Tutorials, IEEE, vol. 12, no. 3, pp. 343-356, Third 2010.
-
(2010)
Communications Surveys Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
14
-
-
14544281525
-
Detecting and classifying delay data exceptions on communication networks using rule based algorithms
-
T. Benmusa, D. J. Parish, and M. Sandford, "Detecting and classifying delay data exceptions on communication networks using rule based algorithms," International Journal of Communication Systems, vol. 18, no. 2, pp. 159-177, 2005. [Online]. Available: http://dx.doi.org/10.1002/dac.694
-
(2005)
International Journal of Communication Systems
, vol.18
, Issue.2
, pp. 159-177
-
-
Benmusa, T.1
Parish, D.J.2
Sandford, M.3
-
15
-
-
84879642111
-
Flow-based detection of dns tunnels
-
G. Doyen, M. Waldburger, P. eleda, A. Sperotto, and B. Stiller, Eds. Springer Berlin Heidelberg
-
W. Ellens, P. uraniewski, A. Sperotto, H. Schotanus, M. Mandjes, and E. Meeuwissen, "Flow-based detection of dns tunnels," in Emerging Management Mechanisms for the Future Internet, ser. Lecture Notes in Computer Science, G. Doyen, M. Waldburger, P. eleda, A. Sperotto, and B. Stiller, Eds. Springer Berlin Heidelberg, 2013, vol. 7943, pp. 124-135.
-
(2013)
Emerging Management Mechanisms for the Future Internet, Ser. Lecture Notes in Computer Science
, vol.7943
, pp. 124-135
-
-
Ellens, W.1
Uraniewski, P.2
Sperotto, A.3
Schotanus, H.4
Mandjes, M.5
Meeuwissen, E.6
-
18
-
-
84911989710
-
Improving pca-based anomaly detection by using multiple time scale analysis and kullbackleibler divergence
-
C. Callegari, L. Gazzarrini, S. Giordano, M. Pagano, and T. Pepe, "Improving pca-based anomaly detection by using multiple time scale analysis and kullbackleibler divergence," International Journal of Communication Systems, pp. n/a-n/a, 2012. [Online]. Available: http://dx.doi.org/10.1002/dac.2432
-
(2012)
International Journal of Communication Systems
-
-
Callegari, C.1
Gazzarrini, L.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
|