-
1
-
-
84994193625
-
The innocent perpetrators: Reflectors and reflection attacks
-
S. Arukonda, and S. Sinha The innocent perpetrators: reflectors and reflection attacks ACSIJ Adv Comput Sci: Int J 4 1 2015 94 98
-
(2015)
ACSIJ Adv Comput Sci: Int J
, vol.4
, Issue.1
, pp. 94-98
-
-
Arukonda, S.1
Sinha, S.2
-
5
-
-
84904303953
-
Can a DDoS attack meltdown my data center? A simulation study and defense strategies
-
Z. Anwar, and A. Malik Can a DDoS attack meltdown my data center? A simulation study and defense strategies IEEE Commun Lett 18 7 2014 1175 1178
-
(2014)
IEEE Commun Lett
, vol.18
, Issue.7
, pp. 1175-1178
-
-
Anwar, Z.1
Malik, A.2
-
8
-
-
84908131526
-
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
-
M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection Pattern Recogn Lett 51 2015 1 7
-
(2015)
Pattern Recogn Lett
, vol.51
, pp. 1-7
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
9
-
-
84862014620
-
Analyzing well-known countermeasures against distributed denial of service attacks
-
H. Beitollahi, and G. Deconinck Analyzing well-known countermeasures against distributed denial of service attacks Comput Commun 35 11 2012 1312 1332
-
(2012)
Comput Commun
, vol.35
, Issue.11
, pp. 1312-1332
-
-
Beitollahi, H.1
Deconinck, G.2
-
10
-
-
84900351494
-
Detecting distributed denial of service attacks: Methods, tools and future directions
-
M.H. Bhuyan, H.J. Kashyap, D.K. Bhattacharyya, and J.K. Kalita Detecting distributed denial of service attacks: methods, tools and future directions Comput J 2013 bxt031
-
(2013)
Comput J
, pp. bxt031
-
-
Bhuyan, M.H.1
Kashyap, H.J.2
Bhattacharyya, D.K.3
Kalita, J.K.4
-
13
-
-
84894646147
-
Network anomaly detection: Methods, systems and tools
-
M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita Network anomaly detection: methods, systems and tools IEEE Commun Surv Tutor 16 1 2014 303 336
-
(2014)
IEEE Commun Surv Tutor
, vol.16
, Issue.1
, pp. 303-336
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
14
-
-
78649686165
-
Cloud computing - A classification, business models, and research directions
-
W. Christof, D. Anandasivam, B. Blau, D. Borissov, D. Menin, D. Michalk, and J. Stober Cloud computing - a classification, business models, and research directions Bus Inf Syst Eng 1 5 2009 391 399
-
(2009)
Bus Inf Syst Eng
, vol.1
, Issue.5
, pp. 391-399
-
-
Christof, W.1
Anandasivam, D.2
Blau, B.3
Borissov, D.4
Menin, D.5
Michalk, D.6
Stober, J.7
-
15
-
-
84900803881
-
Detecting web based DDoS attack using MapReduce operations in cloud computing environment
-
J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, P Detecting web based DDoS attack using MapReduce operations in cloud computing environment J Internet Serv Inf Secur 3 3-4 2013 28 37
-
(2013)
J Internet Serv Inf Secur
, vol.3
, Issue.3-4
, pp. 28-37
-
-
Choi, J.1
Choi, C.2
Ko, B.3
Choi, D.4
Kim, P.P.5
-
17
-
-
84905744352
-
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
-
J. Choi, C. Choi, B. Ko, and P. Kim A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment Soft Comput 18 9 2014 1697 1703
-
(2014)
Soft Comput
, vol.18
, Issue.9
, pp. 1697-1703
-
-
Choi, J.1
Choi, C.2
Ko, B.3
Kim, P.4
-
21
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
A. Chonka, Y. Xiang, W. Zhou, and A. Bonti Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks J Netw Comput Appl 34 4 2011 1097 1107
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.4
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
22
-
-
84949671050
-
A cloud computing based network monitoring and threat detection system for critical infrastructures
-
Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, and C. Lu A cloud computing based network monitoring and threat detection system for critical infrastructures Big Data Res 2015 10.1016/j.bdr.2015.11.002
-
(2015)
Big Data Res
-
-
Chen, Z.1
Xu, G.2
Mahalingam, V.3
Ge, L.4
Nguyen, J.5
Yu, W.6
Lu, C.7
-
26
-
-
84885197342
-
A confidence-based filtering method for DDoS attack defense in cloud environment
-
W. Dou, Q. Chen, and J. Chen A confidence-based filtering method for DDoS attack defense in cloud environment Future Gener Comput Syst 29 7 2013 1838 1850
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.7
, pp. 1838-1850
-
-
Dou, W.1
Chen, Q.2
Chen, J.3
-
27
-
-
77953130221
-
A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance
-
V. De Oca, D. Jeske, Q. Zhang, C. Rendon, and M. Mazda A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance J Syst Softw 83 7 2010 1288 1297
-
(2010)
J Syst Softw
, vol.83
, Issue.7
, pp. 1288-1297
-
-
De Oca, V.1
Jeske, D.2
Zhang, Q.3
Rendon, C.4
Mazda, M.5
-
28
-
-
84924706348
-
Stealthy denial of service strategy in cloud computing
-
M. Ficco, and M. Rak Stealthy denial of service strategy in cloud computing IEEE Trans Cloud Comput 3 1 2015 80 94
-
(2015)
IEEE Trans Cloud Comput
, vol.3
, Issue.1
, pp. 80-94
-
-
Ficco, M.1
Rak, M.2
-
29
-
-
84896384099
-
An advanced intrusion detection framework for cloud computing
-
M. Ficco, S. Venticinque, and B. Di Martino An advanced intrusion detection framework for cloud computing Comput Syst Sci Eng 28 6 2013 401 411
-
(2013)
Comput Syst Sci Eng
, vol.28
, Issue.6
, pp. 401-411
-
-
Ficco, M.1
Venticinque, S.2
Di Martino, B.3
-
30
-
-
84882403734
-
Security event correlation approach for cloud computing
-
M. Ficco Security event correlation approach for cloud computing Int J High Perform Comput Netw 7 3 2013 173 185
-
(2013)
Int J High Perform Comput Netw
, vol.7
, Issue.3
, pp. 173-185
-
-
Ficco, M.1
-
31
-
-
85027465865
-
Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks
-
M. Ficco, and F. Palmieri Introducing fraudulent energy consumption in cloud infrastructures: a new generation of denial-of-service attacks IEEE Syst J 99 2015 1 11
-
(2015)
IEEE Syst J
, vol.99
, pp. 1-11
-
-
Ficco, M.1
Palmieri, F.2
-
32
-
-
84926426310
-
A quantitative analysis of current security concerns and solutions for cloud computing
-
N. Gonzalez, C. Miers, F. Redigolo, M. Naslund, and M. Pourzandi A quantitative analysis of current security concerns and solutions for cloud computing J Cloud Comput 1 1 2012 1 18
-
(2012)
J Cloud Comput
, vol.1
, Issue.1
, pp. 1-18
-
-
Gonzalez, N.1
Miers, C.2
Redigolo, F.3
Naslund, M.4
Pourzandi, M.5
-
34
-
-
84866690559
-
Distributed cloud intrusion detection model
-
I. Gul, and M. Hussain Distributed cloud intrusion detection model Int J Adv Sci Technol 34 2011 71 82
-
(2011)
Int J Adv Sci Technol
, vol.34
, pp. 71-82
-
-
Gul, I.1
Hussain, M.2
-
36
-
-
84936818071
-
Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment
-
Las Vegas, USA
-
Girma A, Garuba M, Li J, Liu C. Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In: Proceedings of 12th IEEE international conference on information technology - new generations (ITNG), Las Vegas, USA; 2015. p. 212-7.
-
(2015)
Proceedings of 12th IEEE International Conference on Information Technology - New Generations (ITNG)
, pp. 212-217
-
-
Girma, A.1
Garuba, M.2
Li, J.3
Liu, C.4
-
37
-
-
84876551376
-
A profile based network intrusion detection and prevention system for securing cloud environment
-
S. Gupta, P. Kumar, and A. Abraham A profile based network intrusion detection and prevention system for securing cloud environment Int J Distrib Sensor Netw 2013 1 12
-
(2013)
Int J Distrib Sensor Netw
, pp. 1-12
-
-
Gupta, S.1
Kumar, P.2
Abraham, A.3
-
39
-
-
84896501583
-
Packet inter-arrival time distribution in academic computer network
-
E. Garsva, N. Paulauskas, G. Grazulevicius, and L. Gulbinovic Packet inter-arrival time distribution in academic computer network ElektronikairElektrotechnika 20 3 2014 87 90
-
(2014)
ElektronikairElektrotechnika
, vol.20
, Issue.3
, pp. 87-90
-
-
Garsva, E.1
Paulauskas, N.2
Grazulevicius, G.3
Gulbinovic, L.4
-
43
-
-
84908240277
-
A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
-
N.C. Iyengar, G. Ganapathy, P.M. Kumar, and A. Abraham A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment Int J Grid Utility Comput 5 4 2014 236 248
-
(2014)
Int J Grid Utility Comput
, vol.5
, Issue.4
, pp. 236-248
-
-
Iyengar, N.C.1
Ganapathy, G.2
Kumar, P.M.3
Abraham, A.4
-
44
-
-
84875838637
-
Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach
-
Kota Kinabalu, Malaysia
-
Ismail MN, Aborujilah A, Musa S, Shahzad A. Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In: Proceedings of the 7th ACM international conference on ubiquitous information management and communication (ICUIMC'13), Kota Kinabalu, Malaysia; 2013. p. 36.
-
(2013)
Proceedings of the 7th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC'13)
, pp. 36
-
-
Ismail, M.N.1
Aborujilah, A.2
Musa, S.3
Shahzad, A.4
-
45
-
-
84936937008
-
Trilateral trust based defense mechanism against DDoS attacks in cloud computing environment
-
N. Iyengar, and G. Ganapathy Trilateral trust based defense mechanism against DDoS attacks in cloud computing environment Cybern Inf Technol 15 2 2015 119 140
-
(2015)
Cybern Inf Technol
, vol.15
, Issue.2
, pp. 119-140
-
-
Iyengar, N.1
Ganapathy, G.2
-
47
-
-
84876151483
-
Escape-on-sight: An efficient and scalable mechanism for escaping DDoS attacks in cloud computing environment
-
N. Jeyanthi, and N.C. Iyengar Escape-on-sight: an efficient and scalable mechanism for escaping DDoS attacks in cloud computing environment Cybern Inf Technol 13 1 2013 46 60
-
(2013)
Cybern Inf Technol
, vol.13
, Issue.1
, pp. 46-60
-
-
Jeyanthi, N.1
Iyengar, N.C.2
-
48
-
-
84884300634
-
An enhanced entropy approach to detect and prevent DDoS in cloud environment
-
N. Jeyanthi, N.C. Iyengar, P.M. Kumar, and A. Kannammal An enhanced entropy approach to detect and prevent DDoS in cloud environment Int J Commun Netw Inf Secur ((IJCNIS)) 5 2 2013 119 140
-
(2013)
Int J Commun Netw Inf Secur ((IJCNIS))
, vol.5
, Issue.2
, pp. 119-140
-
-
Jeyanthi, N.1
Iyengar, N.C.2
Kumar, P.M.3
Kannammal, A.4
-
49
-
-
84894477998
-
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
-
N. Jeyanthi, U. Barde, M. Sravani, V. Tiwari, and N.C. Iyengar Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP Int J Commun Netw Distrib Syst 11 3 2013 262 279
-
(2013)
Int J Commun Netw Distrib Syst
, vol.11
, Issue.3
, pp. 262-279
-
-
Jeyanthi, N.1
Barde, U.2
Sravani, M.3
Tiwari, V.4
Iyengar, N.C.5
-
51
-
-
84912137646
-
Catch me if you can: A cloud-enabled DDoS defense
-
Atlanta, GA
-
Jia Q, Wang H, Fleck D, Li F, Stavrou A, Powell W. Catch me if you can: a cloud-enabled DDoS defense. In: Proceedings of 44th annual IEEE/IFIP international conference on dependable systems and networks (DSN), Atlanta, GA; 2014. p. 264-75.
-
(2014)
Proceedings of 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
, pp. 264-275
-
-
Jia, Q.1
Wang, H.2
Fleck, D.3
Li, F.4
Stavrou, A.5
Powell, W.6
-
53
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
Md. Tanzim Khorshed, A.B.M. Shawkat Ali, and Saleh A. Wasimi A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Future Gener Comput Syst 28 6 2012 833 851
-
(2012)
Future Gener Comput Syst
, vol.28
, Issue.6
, pp. 833-851
-
-
Khorshed, Md.T.1
Shawkat Ali, A.B.M.2
Wasimi, S.A.3
-
54
-
-
84861164227
-
A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack
-
Bhopal, India
-
Karnwal T, Sivakumar T, Aghila G. A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In: Proceedings of IEEE students' conference on electrical, electronics and computer science (SCEECS), Bhopal, India; 2012. p. 1-5.
-
(2012)
Proceedings of IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS)
, pp. 1-5
-
-
Karnwal, T.1
Sivakumar, T.2
Aghila, G.3
-
55
-
-
84868283421
-
A filter tree approach to protect cloud computing against xml ddos and http DDoS attack
-
T. Karnwal, S. Thandapanii, and A. Gnanasekaran A filter tree approach to protect cloud computing against xml ddos and http DDoS attack Intell Inf 2013 459 469
-
(2013)
Intell Inf
, pp. 459-469
-
-
Karnwal, T.1
Thandapanii, S.2
Gnanasekaran, A.3
-
56
-
-
84872111291
-
Self-similarity based lightweight intrusion detection method for cloud computing
-
Daegu, Korea
-
Kwon H, Kim T, Yu SJ, Sim HK. Self-similarity based lightweight intrusion detection method for cloud computing. In: Proceedings of 3rd international conference on intelligent information and database systems (ACIIDS), Daegu, Korea; 2011. p. 353-62.
-
(2011)
Proceedings of 3rd International Conference on Intelligent Information and Database Systems (ACIIDS)
, pp. 353-362
-
-
Kwon, H.1
Kim, T.2
Yu, S.J.3
Sim, H.K.4
-
58
-
-
0000582220
-
Keeping organizational secrets: Protective institutional mechanisms and their costs
-
J.P. Liebeskind Keeping organizational secrets: protective institutional mechanisms and their costs Ind Corp Change 6 3 2007 623 663
-
(2007)
Ind Corp Change
, vol.6
, Issue.3
, pp. 623-663
-
-
Liebeskind, J.P.1
-
64
-
-
81255172277
-
A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques
-
Athens, Greece
-
Mishra A, Gupta BB, Joshi RC. A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques. In: Proceedings of the IEEE European intelligence and security informatics conference (EISIC), Athens, Greece; 2011. p. 286-9.
-
(2011)
Proceedings of the IEEE European Intelligence and Security Informatics Conference (EISIC)
, pp. 286-289
-
-
Mishra, A.1
Gupta, B.B.2
Joshi, R.C.3
-
65
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan A survey of intrusion detection techniques in cloud J Netw Comput Appl 36 1 2013 42 57
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.1
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
67
-
-
84873323320
-
Bayesian Classifier and Snort based network intrusion detection system in cloud computing
-
Coimbatore, India
-
Modi CN, Patel DR, Patel A, Muttukrishnan R. Bayesian Classifier and Snort based network intrusion detection system in cloud computing. In: Proceedings of 3rd international IEEE conference on computing communication & networking technologies (ICCCNT), Coimbatore, India; 2012. p. 1-7.
-
(2012)
Proceedings of 3rd International IEEE Conference on Computing Communication & Networking Technologies (ICCCNT)
, pp. 1-7
-
-
Modi, C.N.1
Patel, D.R.2
Patel, A.3
Muttukrishnan, R.4
-
68
-
-
84904003665
-
A denial of service attack to UMTS networks using SIM-less devices
-
A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, and A. Castiglione A denial of service attack to UMTS networks using SIM-less devices IEEE Trans Depend Secure Comput 11 3 2014 280 291
-
(2014)
IEEE Trans Depend Secure Comput
, vol.11
, Issue.3
, pp. 280-291
-
-
Merlo, A.1
Migliardi, M.2
Gobbo, N.3
Palmieri, F.4
Castiglione, A.5
-
69
-
-
84928038751
-
Malware detection in the cloud under ensemble empirical mode decomposition
-
Garden Grove, CA
-
Marnerides A, Spachos P, Chatzimisios P, Mauthe A. Malware detection in the cloud under ensemble empirical mode decomposition. In: Proceedings of IEEE International conference on computing, networking and communications (ICNC) and information security symposium, Garden Grove, CA; 2015. p. 82-8.
-
(2015)
Proceedings of IEEE International Conference on Computing, Networking and Communications (ICNC) and Information Security Symposium
, pp. 82-88
-
-
Marnerides, A.1
Spachos, P.2
Chatzimisios, P.3
Mauthe, A.4
-
70
-
-
84994407167
-
Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment
-
P. Negi, A. Mishra, and B.B. Gupta Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment Int J Comput Sci Issues 2 4 2013 142 146
-
(2013)
Int J Comput Sci Issues
, vol.2
, Issue.4
, pp. 142-146
-
-
Negi, P.1
Mishra, A.2
Gupta, B.B.3
-
71
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
T. Nguyen, and G. Armitage A survey of techniques for internet traffic classification using machine learning IEEE Commun Surv Tutor 10 4 2008 56 76
-
(2008)
IEEE Commun Surv Tutor
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.1
Armitage, G.2
-
72
-
-
84994389473
-
-
online
-
[online]
-
-
-
-
73
-
-
84994407162
-
-
online
-
[online]
-
-
-
-
74
-
-
84994420539
-
-
online
-
[online]
-
-
-
-
75
-
-
84994420546
-
-
online
-
[online]
-
-
-
-
76
-
-
84994389482
-
-
online
-
[online]
-
-
-
-
81
-
-
84896297829
-
A distributed approach to network anomaly detection based on independent component analysis
-
F. Palmieri, U. Fiore, and A. Castiglione A distributed approach to network anomaly detection based on independent component analysis Concurr Comput: Pract Exp 26 5 2014 1113 1129
-
(2014)
Concurr Comput: Pract Exp
, vol.26
, Issue.5
, pp. 1113-1129
-
-
Palmieri, F.1
Fiore, U.2
Castiglione, A.3
-
82
-
-
85028295216
-
Energy-oriented denial of service attacks: An emerging menace for large cloud infrastructures
-
F. Palmieri, S. Ricciardi, U. Fiore, M. Ficco, and A. Castiglione Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures J Supercomput 71 5 2013 1620 1641
-
(2013)
J Supercomput
, vol.71
, Issue.5
, pp. 1620-1641
-
-
Palmieri, F.1
Ricciardi, S.2
Fiore, U.3
Ficco, M.4
Castiglione, A.5
-
85
-
-
84864433151
-
State-of-the-art in sequential change-point detection
-
A. Polunchenko, and A. Tartakovsky State-of-the-art in sequential change-point detection Methodol Comput Appl Probab 14 3 2012 649 684
-
(2012)
Methodol Comput Appl Probab
, vol.14
, Issue.3
, pp. 649-684
-
-
Polunchenko, A.1
Tartakovsky, A.2
-
87
-
-
84896319180
-
Google drive: Forensic analysis of data remnants
-
D. Quick, and K.-K.R. Choo Google drive: forensic analysis of data remnants J Netw Comput Appl 40 2014 179 193
-
(2014)
J Netw Comput Appl
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
88
-
-
74049086415
-
Defending against UDP flooding by negative selection algorithm based on eigenvalue sets
-
Xi'an, China
-
Rui X, Wen-Li M, Wen-Ling Z. Defending against UDP flooding by negative selection algorithm based on eigenvalue sets. In: Proceedings of IEEE fifth international conference on information assurance and security (IAS' 09), Xi'an, China, vol. 2; 2009. p. 342-5.
-
(2009)
Proceedings of IEEE Fifth International Conference on Information Assurance and Security (IAS' 09)
, vol.2
, pp. 342-345
-
-
Rui, X.1
Wen-Li, M.2
Wen-Ling, Z.3
-
89
-
-
84994445481
-
-
SC Magazine, Website,
-
(2015)
-
-
-
93
-
-
21144474527
-
Comparison of EWMA, CUSUM and Shiryayev-Roberts procedures for detecting a shift in the mean
-
M. Srivastava, and Y. Wu Comparison of EWMA, CUSUM and Shiryayev-Roberts procedures for detecting a shift in the mean Ann Stat 1993 645 670
-
(1993)
Ann Stat
, pp. 645-670
-
-
Srivastava, M.1
Wu, Y.2
-
95
-
-
84901765824
-
A cooperative intrusion detection model for cloud computing networks
-
S. Teng, C. Zheng, H. Zhu, D. Liu, and W. Zhang A cooperative intrusion detection model for cloud computing networks Int J Secur Appl 8 3 2014 107 118
-
(2014)
Int J Secur Appl
, vol.8
, Issue.3
, pp. 107-118
-
-
Teng, S.1
Zheng, C.2
Zhu, H.3
Liu, D.4
Zhang, W.5
-
96
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
Ottawa, Canada
-
Tavallaee M, Bagheri E, Lu W, Ghorbani A. A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the second IEEE symposium on computational intelligence for security and defense applications (CISDA 2009), Ottawa, Canada; 2009. p.1-6.
-
(2009)
Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009)
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.4
-
98
-
-
84898063513
-
DDoS defense system for web services in a cloud environment
-
T. Vissers, T.S. Somasundaram, L. Pieters, K. Govindarajan, and P. Hellinckx DDoS defense system for web services in a cloud environment Future Gener Comput Syst 37 2014 37 45
-
(2014)
Future Gener Comput Syst
, vol.37
, pp. 37-45
-
-
Vissers, T.1
Somasundaram, T.S.2
Pieters, L.3
Govindarajan, K.4
Hellinckx, P.5
-
99
-
-
84896399206
-
Counteracting security attacks in virtual machines in the cloud using property based attestation
-
V. Varadharajan, and U. Tupakula Counteracting security attacks in virtual machines in the cloud using property based attestation J Netw Comput Appl 40 2014 31 45
-
(2014)
J Netw Comput Appl
, vol.40
, pp. 31-45
-
-
Varadharajan, V.1
Tupakula, U.2
-
101
-
-
84925396031
-
DDoS attack protection in the era of cloud computing and software-defined networking
-
B. Wang, Y. Zheng, W. Lou, and Y. Hou DDoS attack protection in the era of cloud computing and software-defined networking Comput Netw 81 2015 308 319
-
(2015)
Comput Netw
, vol.81
, pp. 308-319
-
-
Wang, B.1
Zheng, Y.2
Lou, W.3
Hou, Y.4
-
102
-
-
84924935399
-
A survey of trends in massive DDoS attacks and cloud-based mitigations
-
F. Wong, and C.X. Tan A survey of trends in massive DDoS attacks and cloud-based mitigations Int J Netw Secur Appl (IJNSA) 6 3 2014 57 71
-
(2014)
Int J Netw Secur Appl (IJNSA)
, vol.6
, Issue.3
, pp. 57-71
-
-
Wong, F.1
Tan, C.X.2
-
103
-
-
84919953308
-
DDoS attack protection in the era of cloud computing and software-defined networking
-
Raleigh, NC
-
Wang B, Zheng Y, Lou W, Hou Y. DDoS attack protection in the era of cloud computing and software-defined networking. In: Proceedings of the 22nd IEEE international conference on network protocols (ICNP), Raleigh, NC; 2014. p. 624-9.
-
(2014)
Proceedings of the 22nd IEEE International Conference on Network Protocols (ICNP)
, pp. 624-629
-
-
Wang, B.1
Zheng, Y.2
Lou, W.3
Hou, Y.4
-
104
-
-
14644397228
-
Change-point monitoring for the detection of DoS attacks
-
H. Wang, Z. Danlu, and G. Kang Change-point monitoring for the detection of DoS attacks IEEE Trans Depend Secur Comput 1 4 2004 193 208
-
(2004)
IEEE Trans Depend Secur Comput
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Danlu, Z.2
Kang, G.3
-
105
-
-
84867090258
-
Defense of DDoS attack for cloud computing
-
Zhangjiajie, China
-
Yang L, Zhang T, Song J, Wang J, Chen P. Defense of DDoS attack for cloud computing. In: Proceedings of IEEE international conference on computer science and automation engineering (CSAE), vol. 2, Zhangjiajie, China; 2012. p. 626-9.
-
(2012)
Proceedings of IEEE International Conference on Computer Science and Automation Engineering (CSAE)
, vol.2
, pp. 626-629
-
-
Yang, L.1
Zhang, T.2
Song, J.3
Wang, J.4
Chen, P.5
-
106
-
-
84906077010
-
Can we beat DDoS attacks in clouds?
-
S. Yu, Y. Tian, S. Guo, and D.O. Wu Can we beat DDoS attacks in clouds? IEEE Trans Parallel Distrib Syst 25 9 2014 2245 2254
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.9
, pp. 2245-2254
-
-
Yu, S.1
Tian, Y.2
Guo, S.3
Wu, D.O.4
-
107
-
-
84962011624
-
Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges
-
Q. Yan, R. Yu, Q. Gong, and J. Li Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges IEEE Commun Surv Tutor 99 2015 1 23
-
(2015)
IEEE Commun Surv Tutor
, vol.99
, pp. 1-23
-
-
Yan, Q.1
Yu, R.2
Gong, Q.3
Li, J.4
-
108
-
-
84888391622
-
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
-
S.T. Zargar, J. Joshi, and T. David A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks IEEE Commun Surv Tutor 15 4 2013 2046 2069
-
(2013)
IEEE Commun Surv Tutor
, vol.15
, Issue.4
, pp. 2046-2069
-
-
Zargar, S.T.1
Joshi, J.2
David, T.3
-
109
-
-
84881309371
-
DDoS verification and attack packet dropping algorithm in cloud computing
-
M. Zakarya DDoS verification and attack packet dropping algorithm in cloud computing World Appl Sci J 23 11 2013 1418 1424
-
(2013)
World Appl Sci J
, vol.23
, Issue.11
, pp. 1418-1424
-
-
Zakarya, M.1
-
110
-
-
80054958822
-
An adaptive Shiryaev-Roberts procedure for monitoring dispersion
-
J. Zhang, C. Zou, and Z. Wang An adaptive Shiryaev-Roberts procedure for monitoring dispersion Comput Ind Eng 61 4 2011 1166 1172
-
(2011)
Comput Ind Eng
, vol.61
, Issue.4
, pp. 1166-1172
-
-
Zhang, J.1
Zou, C.2
Wang, Z.3
-
111
-
-
84958544108
-
A distributed detection scheme based on adaptive CUSUM and weighted CAT against DDoS Attacks
-
Guangzhou, China
-
Zhou Z, Chen X, Wang J, Li X. A distributed detection scheme based on adaptive CUSUM and weighted CAT against DDoS Attacks. In: Proceedings of the 3rd international conference on multimedia technology (ICMT 2013), Guangzhou, China; 2013. p. 97-105.
-
(2013)
Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)
, pp. 97-105
-
-
Zhou, Z.1
Chen, X.2
Wang, J.3
Li, X.4
|