-
1
-
-
66249100918
-
Distributed denial-of- service (ddos) threat in collaborative environment - A survey on ddos attack tools and traceback mechanisms
-
PAR. Kumar and S. Selvakumar, "Distributed Denial-of- Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms," Advance Computing Conference, IACC 2009, pp. 1275-1280, 2009.
-
(2009)
Advance Computing Conference, IACC 2009
, pp. 1275-1280
-
-
Kumar, P.A.R.1
Selvakumar, S.2
-
3
-
-
80255126809
-
Practical real-time intrusion detection using machine learning approaches
-
P. Sangkatsanee, N. Wattanapongsakorn, and C. Charnsripinyo, "Practical real-time intrusion detection using machine learning approaches," Computer Communications, pp. 2227-2235, 2011.
-
(2011)
Computer Communications
, pp. 2227-2235
-
-
Sangkatsanee, P.1
Wattanapongsakorn, N.2
Charnsripinyo, C.3
-
4
-
-
84869385976
-
Detection of malicious and non-malicious website visitors using unsupervised neural network learning
-
D. Stevanovic, N. Vlajic, and A. An, "Detection of malicious and non-malicious website visitors using unsupervised neural network learning," Applied Soft Computing, pp. 698-708, 2013.
-
(2013)
Applied Soft Computing
, pp. 698-708
-
-
Stevanovic, D.1
Vlajic, N.2
An, A.3
-
5
-
-
84875232356
-
Unsupervised traffic classification using flow statistical properties and ip packet payload
-
J. Zhang, Y. Xiang, W. Zhou, and Y. Wang, "Unsupervised traffic classification using flow statistical properties and IP packet payload," Journal of Computer and System, pp. 573-585, 2013.
-
(2013)
Journal of Computer and System
, pp. 573-585
-
-
Zhang, J.1
Xiang, Y.2
Zhou, W.3
Wang, Y.4
-
7
-
-
84878677794
-
Data reduction for the scalable automated analysis of distributed darknet traffic
-
M. Bailey, E. Cooke, F. Jahanian, N. Provos, K. Rosaen, and D. Watson, "Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic," IMC '05 Proc. of the 5th ACM SIGCOMM conference on Internet Measuremen, pp. 239-252, 2005.
-
(2005)
IMC '05 Proc. of the 5th ACM SIGCOMM Conference on Internet Measuremen
, pp. 239-252
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Provos, N.4
Rosaen, K.5
Watson, D.6
-
8
-
-
76249083391
-
Practical correlation analysis between scan and malware profiles against zeroday attacks based ondarknet monitoring
-
K. Nakao, D. Inoue, and E. Masashi, "Practical correlation analysis between scan and malware profiles against zeroday attacks based ondarknet monitoring," IEICE Trans. on Information and Systems, vol.E92-D, no.5, pp. 787-798, 2009.
-
(2009)
IEICE Trans. on Information and Systems
, vol.E92-D
, Issue.5
, pp. 787-798
-
-
Nakao, K.1
Inoue, D.2
Masashi, E.3
-
9
-
-
84871392471
-
Collaborative behavior visualization and its detection by observing darknet traffic
-
S. Akimoto, Y. Hori, and K. Sakurai, "Collaborative behavior visualization and its detection by observing darknet traffic," Cyberspace Safety and Security, pp. 212-226, 2012.
-
(2012)
Cyberspace Safety and Security
, pp. 212-226
-
-
Akimoto, S.1
Hori, Y.2
Sakurai, K.3
-
10
-
-
84888391622
-
A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks
-
IEEE
-
S. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," Communications Surveys & Tutorials, pp. 2046-2069, IEEE, 2013.
-
(2013)
Communications Surveys & Tutorials
, pp. 2046-2069
-
-
Zargar, S.1
Joshi, J.2
Tipper, D.3
-
11
-
-
84923532800
-
Kisowomanabu computer gairon
-
in Jananese
-
H. Yasui, T. Kimura, and H. Tsuji, "Kisowomanabu computer Gairon," Ohmsha, pp. 135-142, 2011, in Jananese.
-
(2011)
Ohmsha
, pp. 135-142
-
-
Yasui, H.1
Kimura, T.2
Tsuji, H.3
-
12
-
-
14944381614
-
-
Technical report, Caida
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Network Telescopes: Techical Report," Technical report, Caida, 2004.
-
(2004)
Network Telescopes: Techical Report
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
13
-
-
0003922190
-
-
Wiley
-
R. O. Duda, P. E. Hart, and D. G. Stork, "Pattern Classification," Wiley, pp. 14-17, 2000.
-
(2000)
Pattern Classification
, pp. 14-17
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
17
-
-
0030715989
-
-
Security and Privacy
-
CL. Schuba, IV. Krsul, and MG. Kuhn, "Analysis of a denial of service attack on TCP," Security and Privacy, pp. 208-223, 1997.
-
(1997)
Analysis of A Denial of Service Attack on TCP
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
-
19
-
-
77951969231
-
Training and testing low-degree polynomial data mappings via linear svm
-
Y. W. Chang, C. J. Hsieh, K. W. Chang, M. Ringgaard, and C. J. Lin, "Training and Testing Low-degree Polynomial Data Mappings via Linear SVM," Journal of Machine Learning Research, pp. 1471-1490, 11, 2010.
-
(2010)
Journal of Machine Learning Research
, vol.11
, pp. 1471-1490
-
-
Chang, Y.W.1
Hsieh, C.J.2
Chang, K.W.3
Ringgaard, M.4
Lin, C.J.5
-
20
-
-
0242288807
-
Model selection for support vector machine classification
-
C. Gold and P. Sollich, "Model selection for support vector machine classification," Neurocomputing, pp. 221-249, 2003.
-
(2003)
Neurocomputing
, pp. 221-249
-
-
Gold, C.1
Sollich, P.2
-
21
-
-
4944228528
-
-
Technical report, Department of Computer Science, National Taiwan University
-
C. W. Hsu, C. C. Chang, and C. J. Lin, "A practical guide to support vector classification," Technical report, Department of Computer Science, National Taiwan University. 2003.
-
(2003)
A Practical Guide to Support Vector Classification
-
-
Hsu, C.W.1
Chang, C.C.2
Lin, C.J.3
-
22
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
R. Kohavi, "A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection," IJCAI, 1995.
-
(1995)
IJCAI
-
-
Kohavi, R.1
-
25
-
-
84923626225
-
Backscatter analysis toward clear categorization of dos attacks
-
in Jananese
-
J. Nakazato, J. Shimamura, M. Eto, D. Inoeu, and K. Nakao, "Backscatter Analysis toward Clear Categorization of DoS Attacks," SCIS, 2013, in Jananese.
-
(2013)
SCIS
-
-
Nakazato, J.1
Shimamura, J.2
Eto, M.3
Inoeu, D.4
Nakao, K.5
-
26
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
Software
-
C. C. Chang and C. J. Lin, "LIBSVM: a library for support vector machines," ACM Transactions on Intelligent Systems and Technology, 2:27:1-27:27, 2011. Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2
, pp. 271-2727
-
-
Chang, C.C.1
Lin, C.J.2
|