-
1
-
-
84964271458
-
-
Calculating the size of the downadup outbreak--F-secure weblog: news from the Lab2009. []
-
Calculating the size of the downadup outbreak--F-secure weblog: news from the Lab2009. [http://F-secure.com]
-
-
-
-
2
-
-
61449135082
-
Monitoring the application-layer DDoS sttacks for popular websites
-
Xie Y, Yu S-Z: Monitoring the application-layer DDoS sttacks for popular websites. IEEE/ACM Trans Netw 2009, 17(1):15-25.
-
(2009)
IEEE/ACM Trans Netw
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
3
-
-
27144457682
-
Flash crowd mitigation via adaptive admission control based on application-level observations
-
Chen X, Heidemann J: Flash crowd mitigation via adaptive admission control based on application-level observations. ACM Trans Internet Technol 2005, 5(3):532-569. 10.1145/1084772.1084776
-
(2005)
ACM Trans Internet Technol
, vol.5
, Issue.3
, pp. 532-569
-
-
Chen, X.1
Heidemann, J.2
-
4
-
-
61449207953
-
DDoSshield: DDoS-resilient scheduling to counter application layer attacks
-
Ranjan S, Swaminathan R, Uysal M, Nucci A, Knightly E: DDoSshield: DDoS-resilient scheduling to counter application layer attacks. IEEE/ACM Trans Netw 2009, 17(1):26-39.
-
(2009)
IEEE/ACM Trans Netw
, vol.17
, Issue.1
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
-
5
-
-
47349116678
-
Detection of HTTP-GET flood attack based on analysis of page access behavior
-
art. no. 4313218
-
Yatagai T, Isohara T, Sasase I: Detection of HTTP-GET flood attack based on analysis of page access behavior. Proceedings IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing 2007, 232-235. art. no. 4313218
-
(2007)
Proceedings IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing
, pp. 232-235
-
-
Yatagai, T.1
Isohara, T.2
Sasase, I.3
-
6
-
-
68349137657
-
Is it congestion or a DDoS attack?
-
Shevtekar A, Ansari N: Is it congestion or a DDoS attack? IEEE Commun Lett 2009, 13(7):546-548.
-
(2009)
IEEE Commun Lett
, vol.13
, Issue.7
, pp. 546-548
-
-
Shevtekar, A.1
Ansari, N.2
-
7
-
-
84964261382
-
-
Kandula S, Katabi D, Jacob M, Berger AW: Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds. NSDI'05 []
-
Kandula S, Katabi D, Jacob M, Berger AW: Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds. NSDI'05 [http://www.usenix.org/events/nsdi05/tech/kandula/kandula.pdf]
-
-
-
-
8
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Xie Y, Yu S-Z: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Netw 2009, 17(1):54-65.
-
(2009)
IEEE/ACM Trans Netw
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.-Z.2
-
9
-
-
8344285705
-
Wide area redirection of dynamic content by internet data centers
-
Ranjan S, Karrer R, Knightly E: Wide area redirection of dynamic content by internet data centers. Proc IEEE INFOCOM 2004, 816-826.
-
(2004)
Proc IEEE INFOCOM
, pp. 816-826
-
-
Ranjan, S.1
Karrer, R.2
Knightly, E.3
-
10
-
-
0032786569
-
Improving support vector machine classifiers by modifying kernel function
-
Amari S, Wu S: Improving support vector machine classifiers by modifying kernel function. Neural Netw 1999, 12(6):783-789. 10.1016/S0893-6080(99)00032-5
-
(1999)
Neural Netw
, vol.12
, Issue.6
, pp. 783-789
-
-
Amari, S.1
Wu, S.2
-
11
-
-
33746828214
-
Formulating LLE using alignment technique
-
Zhao D: Formulating LLE using alignment technique. Pattern Recogn 2006, 39(11):2233-2235. 10.1016/j.patcog.2006.05.007
-
(2006)
Pattern Recogn
, vol.39
, Issue.11
, pp. 2233-2235
-
-
Zhao, D.1
-
13
-
-
69349092576
-
A novel text clustering method based on TGSOM and fuzzy K-means
-
art. no. 4958717
-
Hu J, Xiong C, Shu J, Zhou X, Zhu J: A novel text clustering method based on TGSOM and fuzzy K-means. Proceedings of the 1st International Workshop on Education Technology and Computer Science, ETCS 2009, 1: 26-30. art. no. 4958717
-
(2009)
Proceedings of the 1st International Workshop on Education Technology and Computer Science, ETCS
, vol.1
, pp. 26-30
-
-
Hu, J.1
Xiong, C.2
Shu, J.3
Zhou, X.4
Zhu, J.5
-
14
-
-
73449121093
-
Comparative advantage approach for sparse text data clustering
-
art. no. 5329159
-
Ji J, Chan TYT, Zhao Q: Comparative advantage approach for sparse text data clustering. Proceedings - IEEE 9th International Conference on Computer and Information Technology, CIT 2009, 1: 3-8. art. no. 5329159
-
(2009)
Proceedings - IEEE 9th International Conference on Computer and Information Technology, CIT
, vol.1
, pp. 3-8
-
-
Ji, J.1
Chan, T.Y.T.2
Zhao, Q.3
-
16
-
-
37849023846
-
Incremental update of linear appearance models and its application to AAM: incremental AAM
-
Lee S, Sung J, Kim D: Incremental update of linear appearance models and its application to AAM: incremental AAM. Lecture Notes Comput Sci 2007, 4633: 538-547. 10.1007/978-3-540-74260-9_48
-
(2007)
Lecture Notes Comput Sci
, vol.4633
, pp. 538-547
-
-
Lee, S.1
Sung, J.2
Kim, D.3
|