-
1
-
-
84855596504
-
Development of an algorithm for fiber-to-the-home passive optical network automatic self-restoration scheme using access control system
-
Ab-Rahman, S.M. and S.R.A. Mahir, 2011. Development of an algorithm for fiber-to-the-home passive optical network automatic self-restoration scheme using access control system. J. Comput. Sci., 7: 1846-1853. DOI: 10.3844/jcssp.2011.1846.1853
-
(2011)
J. Comput. Sci
, vol.7
, pp. 1846-1853
-
-
Ab-Rahman, S.M.1
Mahir, S.R.A.2
-
2
-
-
0000004140
-
Measurement in medicine: The analysis of method comparison studies
-
Altman, D.G. and J.M. Bland, 1983. Measurement in medicine: The analysis of method comparison studies. J. Royal Statistical Society, 32: 307-317. DOI: 10.2307/2987937
-
(1983)
J. Royal Statistical Society
, vol.32
, pp. 307-317
-
-
Altman, D.G.1
Bland, J.M.2
-
3
-
-
84867519215
-
Inference of network anomaly propagation using spatio-temporal correlation
-
Amaral, A.A., B.B. Zarpelão, L.S. Mendes, J.J.P.C. Rodrigues and M.L. Proença Jr., 2012. Inference of network anomaly propagation using spatio-temporal correlation. J. Netw. Comput. Appli., 35: 1781-1792. DOI: 10.1016/j.jnca.2012.07.003
-
(2012)
J. Netw. Comput. Appli
, vol.35
, pp. 1781-1792
-
-
Amaral, A.A.1
Zarpelão, B.B.2
Mendes, L.S.3
Rodrigues, J.J.P.C.4
Proença, M.L.5
-
4
-
-
39349111817
-
Intelligent flow-based sampling for effective network anomaly detection
-
Nov. 26-30, IEEE Xplore Press, Washington
-
Androulidakis, G. and S. Papavassiliou, 2007. Intelligent flow-based sampling for effective network anomaly detection. Proceedings of the IEEE Global Telecommunications Conference, Nov. 26-30, IEEE Xplore Press, Washington, pp: 1948-1953. DOI: 10.1109/GLOCOM.2007.374
-
(2007)
Proceedings of the IEEE Global Telecommunications Conference
, pp. 1948-1953
-
-
Androulidakis, G.1
Papavassiliou, S.2
-
5
-
-
80052446019
-
Optimizing flow sampling for network anomaly detection
-
Jul. 4-8, IEEE Xplore Press, Istanbul
-
Bartos, K., M. Rehak and V. Krmicek, 2011. Optimizing flow sampling for network anomaly detection. Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, Jul. 4-8, IEEE Xplore Press, Istanbul, pp: 1304-1309. DOI: 10.1109/IWCMC.2011.5982728
-
(2011)
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference
, pp. 1304-1309
-
-
Bartos, K.1
Rehak, M.2
Krmicek, V.3
-
6
-
-
66249114977
-
Java based simulator to detect zero-day silent worms using ACTM
-
Mar. 6-7, IEEE Xplore Press, Patiala
-
Bhatia, A., P.S. Dhabe and S.G. Pukale, 2009. Java based simulator to detect zero-day silent worms using ACTM. Proceedings of the IEEE International Advance Computing Conference, Mar. 6-7, IEEE Xplore Press, Patiala, pp: 847-852. DOI: 10.1109/IADCC.2009.4809125
-
(2009)
Proceedings of the IEEE International Advance Computing Conference
, pp. 847-852
-
-
Bhatia, A.1
Dhabe, P.S.2
Pukale, S.G.3
-
7
-
-
84893496533
-
Aberrant behavior detection in time series for network monitoring
-
(Dec. 3-8), USENIX Association, USA
-
Brutlag, J.D., 2000. Aberrant behavior detection in time series for network monitoring. Proceedings of the 14th Systems Administration Conference, (Dec. 3-8), USENIX Association, USA, pp: 139-146.
-
(2000)
Proceedings of the 14th Systems Administration Conference
, pp. 139-146
-
-
Brutlag, J.D.1
-
8
-
-
0033332344
-
Simulation to support operational testing: A practical application
-
Dec. 5-8, IEEE Xplore Press, Phoenix
-
Canova, B.S., P.H. Christensen, M.D. Lee, B.R. Tripp and M.H. Pack et al., 1999. Simulation to support operational testing: A practical application. Proceedings of the Winter Simulation Conference, Dec. 5-8, IEEE Xplore Press, Phoenix, pp: 1071-1078. DOI: 10.1109/WSC.1999.816823
-
(1999)
Proceedings of the Winter Simulation Conference
, pp. 1071-1078
-
-
Canova, B.S.1
Christensen, P.H.2
Lee, M.D.3
Tripp, B.R.4
Pack, M.H.5
-
9
-
-
84916624305
-
Digital signature of network segment for healthcare environments support
-
Carvalho, L.F., G. Fernandes Jr., M.V.O. de Assis, J.J.P.C. Rodrigues and M.L. Proença Jr., 2014. Digital signature of network segment for healthcare environments support. IRBM, 35: 299-309. DOI: 10.1016/j.irbm.2014.09.001
-
(2014)
IRBM
, vol.35
, pp. 299-309
-
-
Carvalho, L.F.1
Fernandes, G.2
de Assis, M.V.O.3
Rodrigues, J.J.P.C.4
Proença, M.L.5
-
10
-
-
84893382978
-
Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection
-
Telecommunications and Computer Networks, Sep. 18-20, IEEE Xplore Press, Primosten
-
Carvalho, L.F., J.J.P.C. Rodrigues, S. Barbon and M.L. Proenca, 2013. Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection. Proceedings of the 21st International Conference on Software, Telecommunications and Computer Networks, Sep. 18-20, IEEE Xplore Press, Primosten, pp: 1-5. DOI: 10.1109/SoftCOM.2013.6671906
-
(2013)
Proceedings of the 21st International Conference on Software
, pp. 1-5
-
-
Carvalho, L.F.1
Rodrigues, J.J.P.C.2
Barbon, S.3
Proenca, M.L.4
-
11
-
-
84946427162
-
Scorpius-sFlow Anomaly Simulator (version 1.0)
-
Brazil
-
de Assis, M.V.O., 2014. Scorpius-sFlow Anomaly Simulator (version 1.0). JAVA. Brazil.
-
(2014)
JAVA
-
-
de Assis, M.V.O.1
-
12
-
-
84904103233
-
A novel anomaly detection system based on seven-dimensional flow analysis
-
Dec. 9-13, IEEE Xplore Press, Atlanta
-
de Assis, M.V.O., J.J.P.C. Rodrigues and M.L. Proença Jr., 2013. A novel anomaly detection system based on seven-dimensional flow analysis. Proceedings of the IEEE Global Communications Conference, Dec. 9-13, IEEE Xplore Press, Atlanta, pp: 735-740. DOI: 10.1109/GLOCOM.2013.6831160
-
(2013)
Proceedings of the IEEE Global Communications Conference
, pp. 735-740
-
-
de Assis, M.V.O.1
Rodrigues, J.J.P.C.2
Proença, M.L.3
-
13
-
-
84901825380
-
A seven-dimensional flow analysis to help autonomous network management
-
de Assis, M.V.O., J.J.P.C. Rodrigues and M.L. Proença Jr., 2014. A seven-dimensional flow analysis to help autonomous network management. Inform. Sci., 278: 900-913. DOI: 10.1016/j.ins.2014.03.102
-
(2014)
Inform. Sci
, vol.278
, pp. 900-913
-
-
de Assis, M.V.O.1
Rodrigues, J.J.P.C.2
Proença, M.L.3
-
14
-
-
84891355510
-
Digital signature to help network management using principal component analysis and k-means clustering
-
Jun. 9-13, IEEE Xplore Press, Budapest
-
Fernandes, G., A.M. Zacaron, J.J.P.C. Rodrigues and M.L. Proenca, 2013. Digital signature to help network management using principal component analysis and k-means clustering. Proceedings of the IEEE International Conference on Communications, Jun. 9-13, IEEE Xplore Press, Budapest, pp: 2519-2523. DOI: 10.1109/ICC.2013.6654912
-
(2013)
Proceedings of the IEEE International Conference on Communications
, pp. 2519-2523
-
-
Fernandes, G.1
Zacaron, A.M.2
Rodrigues, J.J.P.C.3
Proenca, M.L.4
-
15
-
-
50049097505
-
Detection network anomalies based on packet and flow analys
-
Apr. 13-18, IEEE Xplore Press, Cancun
-
Hong, W., G. Zhenghu, G. Qing and W. Baosheng,2008. Detection network anomalies based on packet and flow analysis. Proceedings of the 7th International Conference on Networking, Apr. 13-18, IEEE Xplore Press, Cancun, pp: 497-502. DOI: 10.1109/ICN.2008.83
-
(2008)
Proceedings of the 7th International Conference on Networking
, pp. 497-502
-
-
Hong, W.1
Zhenghu, G.2
Qing, G.3
Baosheng, W.4
-
16
-
-
84867243953
-
Global detection of DDoS attack based on time and frequency analysis
-
Circuits and Systems, Jul. 11-13, IEEE Xploer Press, Kokura
-
Hua, L., H. Guang-min and Y. Xing-miao, 2007. Global detection of DDoS attack based on time and frequency analysis. Proceedings of the International Conference on Communications, Circuits and Systems, Jul. 11-13, IEEE Xploer Press, Kokura, pp: 462-466. DOI: 10.1109/ICCCAS.2007.6251606
-
(2007)
Proceedings of the International Conference on Communications
, pp. 462-466
-
-
Hua, L.1
Guang-min, H.2
Xing-miao, Y.3
-
17
-
-
67249121449
-
A framework for network state management in the next-generation internet architecture
-
Nov. 30-Dec. 4, IEEE Xplore Press, New Orleans
-
Huang, X., S. Ganapathy and T. Wolf, 2008. A framework for network state management in the next-generation internet architecture. Proceedings of the IEEE Global Telecommunications Conference, Nov. 30-Dec. 4, IEEE Xplore Press, New Orleans, pp: 1-5. DOI: 10.1109/GLOCOM.2008.ECP.435
-
(2008)
Proceedings of the IEEE Global Telecommunications Conference
, pp. 1-5
-
-
Huang, X.1
Ganapathy, S.2
Wolf, T.3
-
18
-
-
84893245118
-
Flow-based anomaly detection using neural network optimized with gsa algorithm
-
Jul. 8-11, IEEE Xplore Press, Philadelphia
-
Jadidi, Z., V. Muthukkumarasamy, E. Sithirasenan and M. Sheikhan, 2013. Flow-based anomaly detection using neural network optimized with gsa algorithm. Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems Workshops, Jul. 8-11, IEEE Xplore Press, Philadelphia, pp: 76-81. DOI: 10.1109/ICDCSW.2013.40
-
(2013)
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems Workshops
, pp. 76-81
-
-
Jadidi, Z.1
Muthukkumarasamy, V.2
Sithirasenan, E.3
Sheikhan, M.4
-
19
-
-
80052163345
-
An accurate sampling scheme for detecting SYN flooding attacks and portscans
-
Jun. 5-9, IEEE Xplore Press, Kyoto
-
Korczynski, M., L. Janowski and A. Duda, 2011. An accurate sampling scheme for detecting SYN flooding attacks and portscans. Proceedings of the IEEE International Conference on Communications, Jun. 5-9, IEEE Xplore Press, Kyoto, pp: 1-5. DOI: 10.1109/icc.2011.5962593
-
(2011)
Proceedings of the IEEE International Conference on Communications
, pp. 1-5
-
-
Korczynski, M.1
Janowski, L.2
Duda, A.3
-
20
-
-
49749101200
-
Cyber attack modeling and simulation for network security analysis
-
Dec. 9-12, IEEE Xplore Press, Washington
-
Kuhl, M.E., J. Kistner, K. Costantini and M. Sudit, 2007. Cyber attack modeling and simulation for network security analysis. Proceedings of the Winter Simulation Conference, Dec. 9-12, IEEE Xplore Press, Washington, pp: 1180-1188. DOI: 10.1109/WSC.2007.4419720
-
(2007)
Proceedings of the Winter Simulation Conference
, pp. 1180-1188
-
-
Kuhl, M.E.1
Kistner, J.2
Costantini, K.3
Sudit, M.4
-
21
-
-
72849128542
-
Distinguishing DDoS attacks from flash crowds using probability metrics."
-
Oct. 19-21, IEEE Xplore Press, Gold Coast
-
Li, K., W. Zhou, P. Li, J. Hai and J. Liu, 2009. Distinguishing DDoS attacks from flash crowds using probability metrics." Proceedings of the 3rd International Conference on Network and System Security, Oct. 19-21, IEEE Xplore Press, Gold Coast, pp: 9-17. DOI: 10.1109/NSS.2009.35
-
(2009)
Proceedings of the 3rd International Conference on Network and System Security
, pp. 9-17
-
-
Li, K.1
Zhou, W.2
Li, P.3
Hai, J.4
Liu, J.5
-
22
-
-
77649295305
-
Research on DoS attack and detection programming
-
Nov. 21-22, IEEE Xplore Press, Nanchang
-
Liu, W., 2009. Research on DoS attack and detection programming. Proceedings of the 3rd International Symposium on Intelligent Information Technology Application, Nov. 21-22, IEEE Xplore Press, Nanchang, pp: 207-210. DOI: 10.1109/IITA.2009.165
-
(2009)
Proceedings of the 3rd International Symposium on Intelligent Information Technology Application
, pp. 207-210
-
-
Liu, W.1
-
23
-
-
77956305269
-
Optimized testing of modern protection equipment using transient simulation
-
Mar. 29-Apr. 1, IEEE Xplore Press, Manchester
-
Mempel, C., B. Cialla and R. Luxenburger, 2010. Optimized testing of modern protection equipment using transient simulation. Proceedings of the 10th IET International Conference on Developments in Power System Protection, Mar. 29-Apr. 1, IEEE Xplore Press, Manchester, pp: 1-5. DOI: 10.1049/cp.2010.0340
-
(2010)
Proceedings of the 10th IET International Conference on Developments in Power System Protection
, pp. 1-5
-
-
Mempel, C.1
Cialla, B.2
Luxenburger, R.3
-
24
-
-
84946427164
-
Correlational paraconsistent machine for anomaly detection
-
Dec. 8-12, IEEE Xplore Press, Austin
-
Pena, E.H.M., S. Barbon, J.J.P.C. Rodrigues and M.L. Proença Jr., 2014a. Correlational paraconsistent machine for anomaly detection. Proceedings of the IEEE Global Communications Conference, Dec. 8-12, IEEE Xplore Press, Austin, pp: 551-556. DOI: 10.1109/GLOCOM.2014.7036865
-
(2014)
Proceedings of the IEEE Global Communications Conference
, pp. 551-556
-
-
Pena, E.H.M.1
Barbon, S.2
Rodrigues, J.J.P.C.3
Proença, M.L.4
-
25
-
-
84908199123
-
Anomaly detection using digital signature of network segment with adaptive arima model and paraconsistent logic."
-
Jun. 23-16, IEEE Xplore Press, Funchal
-
Pena, E.H.M., S. Barbon, J.J.P.C. Rodrigues and M.L. Proença Jr., 2014b. Anomaly detection using digital signature of network segment with adaptive arima model and paraconsistent logic." Proceedings of the IEEE Symposium on Computers and Communication, Jun. 23-16, IEEE Xplore Press, Funchal, pp: 1-6. DOI: 10.1109/ISCC.2014.6912503
-
(2014)
Proceedings of the IEEE Symposium on Computers and Communication
, pp. 1-6
-
-
Pena, E.H.M.1
Barbon, S.2
Rodrigues, J.J.P.C.3
Proença, M.L.4
-
26
-
-
84880127634
-
Data integrity proof and secure computation in cloud computing
-
Ponnuramu, V. and L. Tamilselvan, 2012. Data integrity proof and secure computation in cloud computing. J. Comput. Sci., 8: 1987-1995. DOI: 10.3844/jcssp.2012.1987.1995
-
(2012)
J. Comput. Sci
, vol.8
, pp. 1987-1995
-
-
Ponnuramu, V.1
Tamilselvan, L.2
-
27
-
-
84946405794
-
-
Intense School, NFOSEC Institute
-
Praetox Technologies, 2010. Low Orbit Ion Cannon. Intense School, NFOSEC Institute.
-
(2010)
Low Orbit Ion Cannon
-
-
-
28
-
-
84894549552
-
Distributive power migration and management algorithm for cloud environment
-
Prakash, P., G. Kousalya, S.K. Vasudevan and K.K. Rangaraju, 2014. Distributive power migration and management algorithm for cloud environment. J. Comput. Sci., 10: 484-491. DOI: 10.3844/jcssp.2014.484.491
-
(2014)
J. Comput. Sci
, vol.10
, pp. 484-491
-
-
Prakash, P.1
Kousalya, G.2
Vasudevan, S.K.3
Rangaraju, K.K.4
-
29
-
-
34250779136
-
The Hurst Parameter for Digital Signature of Network Segment
-
J.N. de Souza, P. Dini and P. Lorenz (Eds.), Springer Berlin Heidelberg, Brazil
-
Proença Jr., M.L., C. Coppelmans, M. Bottoli, A. Alberti and L.S. Mendes, 2004. The Hurst Parameter for Digital Signature of Network Segment. In: Telecommunications and Networking-ICT 2004, J.N. de Souza, P. Dini and P. Lorenz (Eds.), Springer Berlin Heidelberg, Brazil, ISBN-10: 978-3-540-27824-5, pp: 772-781.
-
(2004)
Telecommunications and Networking-ICT 2004
, pp. 772-781
-
-
Proença, M.L.1
Coppelmans, C.2
Bottoli, M.3
Alberti, A.4
Mendes, L.S.5
-
30
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza, N.J., K. Zhang, M. Chung, B. Mukherjee and R.A. Olsson. 1996. A methodology for testing intrusion detection systems. IEEE Trans. Software Eng., 22: 719-729. DOI: 10.1109/32.544350
-
(1996)
IEEE Trans. Software Eng
, vol.22
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
31
-
-
78649337695
-
Comparing time histories for validation of simulation models: Error measures and metrics
-
Sarin, H., M. Kokkolaras, G. Hulbert, P. Papalambros and S. Barbat et al., 2010. Comparing time histories for validation of simulation models: Error measures and metrics. J. Dynamic Syst. Measurement Control, 132: 061401-061411. DOI: 10.1115/1.4002478
-
(2010)
J. Dynamic Syst. Measurement Control
, vol.132
-
-
Sarin, H.1
Kokkolaras, M.2
Hulbert, G.3
Papalambros, P.4
Barbat, S.5
-
32
-
-
0002947255
-
A mathematical theory of communication
-
Shannon, C.E., 2001. A mathematical theory of communication. SIGMOBILE Mobile Comput. Commun. Rev., 5: 3-55. DOI: 10.1145/584091.584093
-
(2001)
SIGMOBILE Mobile Comput. Commun. Rev
, vol.5
, pp. 3-55
-
-
Shannon, C.E.1
-
33
-
-
17744362921
-
A simple and intuitive simulation tool for analyzing emergency department operations
-
Dec. 5-8, IEEE Xplore Press
-
Sinreich, D. and Y.N. Marmor, 2004. A simple and intuitive simulation tool for analyzing emergency department operations. Proceedings of the Winter Simulation Conference, Dec. 5-8, IEEE Xplore Press, pp: 1994-2002. DOI: 10.1109/WSC.2004.1371561
-
(2004)
Proceedings of the Winter Simulation Conference
, pp. 1994-2002
-
-
Sinreich, D.1
Marmor, Y.N.2
-
34
-
-
84871996169
-
Identifying standardization opportunities of an operator-driven, framework for unifying autonomic network and service management
-
IEEE Xplore Press, Ottawa
-
Tsagkaris, K., A. Galani, P. Demestichas, G. Nguengang and M. Bouet et al., 2012. Identifying standardization opportunities of an operator-driven, framework for unifying autonomic network and service management. Proceedings of the IEEE International Conference on Communications, IEEE Xplore Press, Ottawa, pp: 6921-6925. DOI: 10.1109/ICC.2012.6364850
-
(2012)
Proceedings of the IEEE International Conference on Communications
, pp. 6921-6925
-
-
Tsagkaris, K.1
Galani, A.2
Demestichas, P.3
Nguengang, G.4
Bouet, M.5
-
35
-
-
77952750486
-
An anomaly detection scheme based on machine learning for WSN
-
Dec. 26-28, IEEE Xplore Press, Nanjing
-
Xiao, Z., C. Liu and C. Chen, 2009. An anomaly detection scheme based on machine learning for WSN. Proceedings of the 1st International Conference on Information Science and Engineering, Dec. 26-28, IEEE Xplore Press, Nanjing, pp: 3959-396 2. DOI: 10.1109/ICISE.2009.235
-
(2009)
Proceedings of the 1st International Conference on Information Science and Engineering
, pp. 3959-3962
-
-
Xiao, Z.1
Liu, C.2
Chen, C.3
-
36
-
-
34250755328
-
Anomaly detection aiming pro-active management of computer network based on digital signature of network segment
-
Zarpelão, B.B., L.D.S. Mendes and M.L. Proença Jr.,2007. Anomaly detection aiming pro-active management of computer network based on digital signature of network segment. J. Netw. Syst. Manage., 15: 267-83. DOI: 10.1007/s10922-007-9064-y
-
(2007)
J. Netw. Syst. Manage
, vol.15
, pp. 267-283
-
-
Zarpelão, B.B.1
Mendes, L.D.S.2
Proença, M.L.3
-
37
-
-
77951593049
-
Parameterized anomaly detection system with automatic configuration
-
Nov. 30-Dec. 4, IEEE Xplore Press, Honolulu
-
Zarpelao, B.B., L.S. Mendes, M.L. Proenca and J.J.P.C. Rodrigues, 2009. Parameterized anomaly detection system with automatic configuration. Proceedings of the IEEE Global Telecommunications Conference, Nov. 30-Dec. 4, IEEE Xplore Press, Honolulu, pp: 1-6. DOI: 10.1109/GLOCOM.2009.5426189
-
(2009)
Proceedings of the IEEE Global Telecommunications Conference
, pp. 1-6
-
-
Zarpelao, B.B.1
Mendes, L.S.2
Proenca, M.L.3
Rodrigues, J.J.P.C.4
|