-
2
-
-
84889083567
-
Cloud storage forensics: Owncloud as a case study
-
B. Martini and K.-K. R. Choo, "Cloud storage forensics: owncloud as a case study," Digital Investigation, vol. 10, no. 4, pp. 287-299, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1742287613000911
-
(2013)
Digital Investigation
, vol.10
, Issue.4
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
3
-
-
84956680241
-
Distributed denial of service (ddos) resilience in cloud: Review and conceptual cloud {DDoS} mitigation framework
-
O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, "Distributed denial of service (ddos) resilience in cloud: Review and conceptual cloud {DDoS} mitigation framework," Journal of Network and Computer Applications, vol. 67, pp. 147-165, 2016. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1084804516000023
-
(2016)
Journal of Network and Computer Applications
, vol.67
, pp. 147-165
-
-
Osanaiye, O.1
Choo, K.-K.R.2
Dlodlo, M.3
-
4
-
-
84867888670
-
A novel intrusion severity analysis approach for clouds
-
including Special section: AIRCC-NetCoM 2009 and Special section: Clouds and Service-Oriented Architectures
-
J. Arshad, P. Townend, and J. Xu, "A novel intrusion severity analysis approach for clouds," Future Generation Computer Systems, vol. 29, no. 1, pp. 416-428, 2013, including Special section: AIRCC-NetCoM 2009 and Special section: Clouds and Service-Oriented Architectures. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167739X11001488
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.1
, pp. 416-428
-
-
Arshad, J.1
Townend, P.2
Xu, J.3
-
5
-
-
84900351494
-
Detecting distributed denial of service attacks: Methods, tools and future directions
-
p. bxt031
-
M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, "Detecting distributed denial of service attacks: methods, tools and future directions," The Computer Journal, p. bxt031, 2013.
-
(2013)
The Computer Journal
-
-
Bhuyan, M.H.1
Kashyap, H.J.2
Bhattacharyya, D.K.3
Kalita, J.K.4
-
6
-
-
84958544108
-
A distributed detection scheme based on adaptive cusum and weighted cat against ddos attacks
-
Springer
-
Z. Zhou, X. Chen, J. Wang, and X. Li, "A distributed detection scheme based on adaptive cusum and weighted cat against ddos attacks," in Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013). Springer, 2014, pp. 97-105.
-
(2014)
Proceedings of the 3rd International Conference on Multimedia Technology (ICMT 2013)
, pp. 97-105
-
-
Zhou, Z.1
Chen, X.2
Wang, J.3
Li, X.4
-
7
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
K.-K. R. Choo, "The cyber threat landscape: Challenges and future research directions," Computers & Security, vol. 30, no. 8, pp. 719-731, 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
8
-
-
84942342385
-
Stone: A streaming {DDoS} defense framework
-
V. Gulisano, M. Callau-Zori, Z. Fu, R. Jimnez-Peris, M. Papatriantafilou, and M. Patio-Martnez, "Stone: A streaming {DDoS} defense framework," Expert Systems with Applications, vol. 42, no. 24, pp. 9620-9633, 2015. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S095741741500487X
-
(2015)
Expert Systems with Applications
, vol.42
, Issue.24
, pp. 9620-9633
-
-
Gulisano, V.1
Callau-Zori, M.2
Fu, Z.3
Jimnez-Peris, R.4
Papatriantafilou, M.5
Patio-Martnez, M.6
-
9
-
-
84925396031
-
DDoS attack protection in the era of cloud computing and software-defined networking
-
B. Wang, Y. Zheng, W. Lou, and Y. T. Hou, "{DDoS} attack protection in the era of cloud computing and software-defined networking," Computer Networks, vol. 81, pp. 308-319, 2015. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128615000742
-
(2015)
Computer Networks
, vol.81
, pp. 308-319
-
-
Wang, B.1
Zheng, Y.2
Lou, W.3
Hou, Y.T.4
-
10
-
-
84969794985
-
Ensemble-based multi-filter feature selection method for ddos detection in cloud computing
-
O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, "Ensemble-based multi-filter feature selection method for ddos detection in cloud computing," EURASIP Journal on Wireless Communications and Networking, vol. 2016, no. 1, p. 1, 2016.
-
(2016)
EURASIP Journal on Wireless Communications and Networking
, vol.2016
, Issue.1
, pp. 1
-
-
Osanaiye, O.1
Cai, H.2
Choo, K.-K.R.3
Dehghantanha, A.4
Xu, Z.5
Dlodlo, M.6
-
11
-
-
79960570117
-
Discriminating ddos attack traffic from flash crowd through packet arrival patterns
-
IEEE
-
T. Thapngam, S. Yu, W. Zhou, and G. Beliakov, "Discriminating ddos attack traffic from flash crowd through packet arrival patterns," in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. IEEE, 2011, pp. 952-957.
-
(2011)
Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference On
, pp. 952-957
-
-
Thapngam, T.1
Yu, S.2
Zhou, W.3
Beliakov, G.4
-
12
-
-
84957693763
-
A comprehensive approach to discriminate {DDoS} attacks from flash events
-
M. Sachdeva, K. Kumar, and G. Singh, "A comprehensive approach to discriminate {DDoS} attacks from flash events," Journal of Information Security and Applications, vol. 26, pp. 8-22, 2016. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S2214212615000472
-
(2016)
Journal of Information Security and Applications
, vol.26
, pp. 8-22
-
-
Sachdeva, M.1
Kumar, K.2
Singh, G.3
-
13
-
-
84940750587
-
Security as a service for a cloud federation
-
Á. MacDermott, Q. Shi, M. Merabti, and K. Kifayat, "Security as a service for a cloud federation," in The 15th Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2014), 2014, pp. 77-82.
-
(2014)
The 15th Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2014)
, pp. 77-82
-
-
MacDermott, A.1
Shi, Q.2
Merabti, M.3
Kifayat, K.4
-
14
-
-
84921841977
-
Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection
-
A. G. Fragkiadakis, V. A. Siris, N. E. Petroulakis, and A. P. Traganitis, "Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection," Wireless Communications and Mobile Computing, vol. 15, no. 2, pp. 276-294, 2015.
-
(2015)
Wireless Communications and Mobile Computing
, vol.15
, Issue.2
, pp. 276-294
-
-
Fragkiadakis, A.G.1
Siris, V.A.2
Petroulakis, N.E.3
Traganitis, A.P.4
-
15
-
-
84873838558
-
Efficient computer network anomaly detection by changepoint detection methods
-
A. G. Tartakovsky, A. S. Polunchenko, and G. Sokolov, "Efficient computer network anomaly detection by changepoint detection methods," IEEE Journal of Selected Topics in Signal Processing, vol. 7, no. 1, pp. 4-11, 2013.
-
(2013)
IEEE Journal of Selected Topics in Signal Processing
, vol.7
, Issue.1
, pp. 4-11
-
-
Tartakovsky, A.G.1
Polunchenko, A.S.2
Sokolov, G.3
-
16
-
-
33745371142
-
Proactively detecting distributed denial of service attacks using source IP address monitoring
-
Springer
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Proactively detecting distributed denial of service attacks using source ip address monitoring," in International Conference on Research in Networking. Springer, 2004, pp. 771-782.
-
(2004)
International Conference on Research in Networking
, pp. 771-782
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
18
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
T. T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 56-76, 2008.
-
(2008)
IEEE Communications Surveys & Tutorials
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.T.1
Armitage, G.2
-
19
-
-
84896501583
-
Packet inter-arrival time distribution in academic computer network
-
E. Garsva, N. Paulauskas, G. Grazulevicius, and L. Gulbinovic, "Packet inter-arrival time distribution in academic computer network," Elektronika ir Elektrotechnika, vol. 20, no. 3, pp. 87-90, 2014.
-
(2014)
Elektronika Ir Elektrotechnika
, vol.20
, Issue.3
, pp. 87-90
-
-
Garsva, E.1
Paulauskas, N.2
Grazulevicius, G.3
Gulbinovic, L.4
-
22
-
-
77953130221
-
A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance
-
V. M. De Oca, D. R. Jeske, Q. Zhang, C. Rendon, and M. Marvasti, "A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance," Journal of Systems and Software, vol. 83, no. 7, pp. 1288-1297, 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.7
, pp. 1288-1297
-
-
De Oca, V.M.1
Jeske, D.R.2
Zhang, Q.3
Rendon, C.4
Marvasti, M.5
-
23
-
-
84864433151
-
State-of-the-art in sequential change-point detection
-
A. S. Polunchenko and A. G. Tartakovsky, "State-of-the-art in sequential change-point detection," Methodology and computing in applied probability, vol. 14, no. 3, pp. 649-684, 2012.
-
(2012)
Methodology and Computing in Applied Probability
, vol.14
, Issue.3
, pp. 649-684
-
-
Polunchenko, A.S.1
Tartakovsky, A.G.2
-
24
-
-
0000777150
-
On the run length of a shewhart chart for correlated data
-
W. Schmid, "On the run length of a shewhart chart for correlated data," Statistical Papers, vol. 36, no. 1, pp. 111-130, 1995.
-
(1995)
Statistical Papers
, vol.36
, Issue.1
, pp. 111-130
-
-
Schmid, W.1
-
25
-
-
85004057304
-
Sequential tests of statistical hypotheses
-
Springer
-
A. Wald, "Sequential tests of statistical hypotheses," in Breakthroughs in Statistics. Springer, 1992, pp. 256-298.
-
(1992)
Breakthroughs in Statistics
, pp. 256-298
-
-
Wald, A.1
-
26
-
-
84924420013
-
Stream change detection via passive-aggressive classification and bernoulli cusum
-
D. Martínez-Rego, D. Fernández-Francos, O. Fontenla-Romero, and A. Alonso-Betanzos, "Stream change detection via passive-aggressive classification and bernoulli cusum," Information Sciences, vol. 305, pp. 130-145, 2015.
-
(2015)
Information Sciences
, vol.305
, pp. 130-145
-
-
Martínez-Rego, D.1
Fernández-Francos, D.2
Fontenla-Romero, O.3
Alonso-Betanzos, A.4
-
27
-
-
84893914509
-
Three counter defense mechanism for TCP syn flooding attacks
-
S. Gavaskar, R. Surendiran, and D. E. Ramaraj, "Three counter defense mechanism for tcp syn flooding attacks," International Journal of Computer Applications, vol. 6, no. 6, pp. 0975-8887, 2010.
-
(2010)
International Journal of Computer Applications
, vol.6
, Issue.6
, pp. 0975-8887
-
-
Gavaskar, S.1
Surendiran, R.2
Ramaraj, D.E.3
-
28
-
-
85015344200
-
-
CAIDA. (2000) DDoS Attack 2007 Dataset. [Online]. Available: http://www.caida.org/data/passive/ddos-20070804-dataset.xml
-
(2000)
DDoS Attack 2007 Dataset
-
-
|