-
1
-
-
84970046203
-
Botnet in DDoS attacks: Trends and challenges
-
4th Quart
-
N. Hoque, D. K. Bhattacharyya, and J. K. Kalita, "Botnet in DDoS attacks: Trends and challenges," IEEE Commun. Surveys. Tuts., vol. 17, no. 4, pp. 2242-2270, 4th Quart., 2015.
-
(2015)
IEEE Commun. Surveys. Tuts
, vol.17
, Issue.4
, pp. 2242-2270
-
-
Hoque, N.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
2
-
-
84962339713
-
Software-De-Ned networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing Environments: A survey, some research issues, and challenges
-
1st Quart
-
Q. Yan, F. R. Yu, Q. Gong, and J. Li, "Software-de-ned networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges," IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 602-622, 1st Quart., 2016.
-
(2016)
IEEE Commun. Surveys Tuts
, vol.18
, Issue.1
, pp. 602-622
-
-
Yan, Q.1
Yu, F.R.2
Gong, Q.3
Li, J.4
-
3
-
-
84964587049
-
A survey on OpenFlow-based software de-ned networks: Security challenges and countermeasures
-
Jun.
-
W. Li,W. Meng, and L. F. Kwok, "A survey on OpenFlow-based software de-ned networks: Security challenges and countermeasures," J. Netw. Comput. Appl., vol. 68, pp. 126-139, Jun. 2016.
-
(2016)
J. Netw. Comput. Appl
, vol.68
, pp. 126-139
-
-
LiW Meng, W.1
Kwok, L.F.2
-
4
-
-
84855754585
-
Witnessing distributed denialof-service traf-c from an attacker's network
-
Oct.
-
S.-S. Seo, Y. J. Won, and J. W.-K. Hong, "Witnessing distributed denialof-service traf-c from an attacker's network," in Proc. 7th Int. Conf. Netw. Ser. Manage. (CNSM), Oct. 2011, pp. 1-7.
-
(2011)
Proc. 7th Int. Conf. Netw. Ser. Manage. (CNSM)
, pp. 1-7
-
-
Seo, S.-S.1
Won, Y.J.2
Hong, J.W.-K.3
-
5
-
-
75149179043
-
Histogram-based traf-c anomaly detection
-
Jun.
-
A. Kind, M. P. Stoecklin, and X. Dimitropoulos, "Histogram-based traf-c anomaly detection," IEEE Trans. Netw. Ser. Manage., vol. 6, no. 2, pp. 110-121, Jun. 2009.
-
(2009)
IEEE Trans. Netw. Ser. Manage
, vol.6
, Issue.2
, pp. 110-121
-
-
Kind, A.1
Stoecklin, M.P.2
Dimitropoulos, X.3
-
6
-
-
84871952974
-
Anomaly detection using DSNS and-re-y harmonic clustering algorithm
-
Jun.
-
M. H. A. C. Adaniya, M. F. Lima, J. J. P. C. Rodrigues, T. Abraõ, M. L. Proencą, Jr., "Anomaly detection using DSNS and-re-y harmonic clustering algorithm," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2012, pp. 1183-1187.
-
(2012)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1183-1187
-
-
Adaniya, M.H.A.C.1
Lima, M.F.2
Rodrigues, J.J.P.C.3
Abraõ, T.4
Proencą, M.L.5
-
7
-
-
84904119137
-
Wavelet-Based Multi-Scale anomaly identi-cation in cloud computing systems
-
Dec.
-
Q. Guan and S. Fu, "Wavelet-based multi-scale anomaly identi-cation in cloud computing systems," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 1379-1384.
-
(2013)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 1379-1384
-
-
Guan, Q.1
Fu, S.2
-
8
-
-
84904103233
-
A novel anomaly detection system based on seven-dimensional-ow analysis
-
Dec.
-
M. V. O. de Assis, J. J. P. C. Rodrigues, and M. L. Proencą, Jr., "A novel anomaly detection system based on seven-dimensional-ow analysis," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 735-740.
-
(2013)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 735-740
-
-
De Assis, M.V.O.1
Rodrigues, J.J.P.C.2
Proencą, M.L.3
-
9
-
-
84901825380
-
A sevendimensional-ow analysis to help autonomous network management
-
Sep.
-
M. V. O. de Assis, J. J. P. C. Rodrigues, and M. L. Proencą, Jr., "A sevendimensional-ow analysis to help autonomous network management," Inf. Sci., vol. 278, pp. 900-913, Sep. 2014.
-
(2014)
Inf. Sci
, vol.278
, pp. 900-913
-
-
De Assis, M.V.O.1
Rodrigues, J.J.P.C.2
Proencą, M.L.3
-
10
-
-
84964374650
-
SD-Anti-DDoS: Fast and ef-cient DDoS defense in software-de-ned networks
-
Jun.
-
Y. Cui et al., "SD-Anti-DDoS: Fast and ef-cient DDoS defense in software-de-ned networks," J. Netw. Comput. Appl., vol. 68, pp. 65-79, Jun. 2016.
-
(2016)
J. Netw. Comput. Appl
, vol.68
, pp. 65-79
-
-
Cui, Y.1
-
11
-
-
84897109717
-
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
-
Apr.
-
K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments," Comput. Netw., vol. 62, pp. 122-136, Apr. 2014.
-
(2014)
Comput. Netw
, vol.62
, pp. 122-136
-
-
Giotis, K.1
Argyropoulos, C.2
Androulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
12
-
-
67249153951
-
Autonomous network management using cooperative learning for network-wide load balancing in heterogeneous networks
-
Nov.
-
M. Lee, X. Ye, D. Marconett, S. Johnson, R. Vemuri, and S. J. B. Yoo, "Autonomous network management using cooperative learning for network-wide load balancing in heterogeneous networks," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Nov. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Lee, M.1
Ye, X.2
Marconett, D.3
Johnson, S.4
Vemuri, R.5
Yoo, S.J.B.6
-
13
-
-
67249152333
-
Game theoretic solutions for precoding strategies over the interference channel
-
Nov.
-
J. Gao, S. A. Vorobyov, and H. Jiang, "Game theoretic solutions for precoding strategies over the interference channel," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Nov. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Gao, J.1
Vorobyov, S.A.2
Jiang, H.3
-
14
-
-
84877645855
-
Game theory based resource allocation for cognitive radio networks
-
Dec.
-
O. E. Ferkouss and W. Ajib, "Game theory based resource allocation for cognitive radio networks," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2012, pp. 1174-1179.
-
(2012)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 1174-1179
-
-
Ferkouss, O.E.1
Ajib, W.2
-
15
-
-
84906991657
-
Game-based adaptive security in the Internet of Things for eHealth
-
Jun.
-
M. Hamdi and H. Abie, "Game-based adaptive security in the Internet of Things for eHealth," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 920-925.
-
(2014)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 920-925
-
-
Hamdi, M.1
Abie, H.2
-
16
-
-
84946412609
-
Scorpius: SFlow network anomaly simulator
-
Apr.
-
M. V. O. de Assis and M. L. Proencą, Jr., "Scorpius: SFlow network anomaly simulator," J. Comput. Sci., vol. 11, no. 4, pp. 662-674, Apr. 2015.
-
(2015)
J. Comput. Sci
, vol.11
, Issue.4
, pp. 662-674
-
-
De Assis, M.V.O.1
Proencą, M.L.2
-
17
-
-
85050275081
-
ACO and GA metaheuristics for anomaly detection
-
Nov.
-
A. H. Hamamoto, L. F. Carvalho, and M. L. Proencą, Jr., "ACO and GA metaheuristics for anomaly detection," in Proc. 34th Int. Conf. Chilean Comput. Sci. Soc. (SCCC), Nov. 2015, pp. 1-6.
-
(2015)
Proc. 34th Int. Conf. Chilean Comput. Sci. Soc. (SCCC)
, pp. 1-6
-
-
Hamamoto, A.H.1
Carvalho, L.F.2
Proencą, M.L.3
-
18
-
-
84955178164
-
Interfunction anomaly analysis for correct SDN/NFV deployment
-
Jan.
-
C. Basile, D. Canavese, A. Lioy, C. Pitscheider, and F. Valenza, "Interfunction anomaly analysis for correct SDN/NFV deployment," Int. J. Netw. Manage., vol. 26, no. 1, pp. 25-43, Jan. 2016.
-
(2016)
Int. J. Netw. Manage
, vol.26
, Issue.1
, pp. 25-43
-
-
Basile, C.1
Canavese, D.2
Lioy, A.3
Pitscheider, C.4
Valenza, F.5
-
19
-
-
84959889541
-
Dynamic control plane management for software-de-ned networks
-
Mar.
-
J. Li, J.-H. Yoo, and J.W.-K. Hong, "Dynamic control plane management for software-de-ned networks," Int. J. Netw. Manage., vol. 26, no. 2, pp. 111-130, Mar. 2016.
-
(2016)
Int. J. Netw. Manage
, vol.26
, Issue.2
, pp. 111-130
-
-
Li, J.1
Yoo, J.-H.2
Hong, J.W.-K.3
-
20
-
-
85020922710
-
Control path management framework for enhancing software-de-ned network (SDN) reliability
-
to be published
-
S. Song, H. Park, B.-Y. Choi, T. Choi, and H. Zhu, "Control path management framework for enhancing software-de-ned network (SDN) reliability," IEEE Trans. Netw. Ser. Manage., to be published, doi: 10.1109/TNSM.2017.2669082.
-
IEEE Trans. Netw. Ser. Manage
-
-
Song, S.1
Park, H.2
Choi, B.-Y.3
Choi, T.4
Zhu, H.5
-
21
-
-
84911964556
-
Autonomics and SDN for self-organizing networks
-
Aug.
-
G. Poulios, K. Tsagkaris, P. Demestichas, A. Tall, Z. Altman, and C. Destré, "Autonomics and SDN for self-organizing networks," in Proc. 11th Int. Symp. Wireless Commun. Syst. (ISWCS), Aug. 2014, pp. 830-835.
-
(2014)
Proc. 11th Int. Symp. Wireless Commun. Syst. (ISWCS)
, pp. 830-835
-
-
Poulios, G.1
Tsagkaris, K.2
Demestichas, P.3
Tall, A.4
Altman, Z.5
Destré, C.6
-
22
-
-
84891816613
-
A system for denial-of-service attack detection based on multivariate correlation analysis
-
Feb.
-
Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, "A system for denial-of-service attack detection based on multivariate correlation analysis," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 447-456, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.2
, pp. 447-456
-
-
Tan, Z.1
Jamdagni, A.2
He, X.3
Nanda, P.4
Liu, R.P.5
-
23
-
-
20344364652
-
Denial of service attacks on networkbased control systems: Impact and mitigation
-
May
-
M. Long, C.-H.Wu, and J. Y. Hung, "Denial of service attacks on networkbased control systems: Impact and mitigation," IEEE Trans Ind. Informat., vol. 1, no. 2, pp. 85-96, May 2005.
-
(2005)
IEEE Trans Ind. Informat
, vol.1
, Issue.2
, pp. 85-96
-
-
Long, M.1
Wu, C.-H.2
Hung, J.Y.3
-
24
-
-
84958166080
-
Unsupervised learning clustering and self-organized agents applied to help network management
-
Jul.
-
L. F. Carvalho, S. Barbon, Jr., L. S. de Mendes, and M. L. Proencą, Jr., "Unsupervised learning clustering and self-organized agents applied to help network management," Expert Syst. Appl., vol. 54, pp. 29-47, Jul. 2016.
-
(2016)
Expert Syst. Appl
, vol.54
, pp. 29-47
-
-
Carvalho, L.F.1
-
25
-
-
84954438979
-
On network operating system security
-
Jan.
-
C. Röpke and T. Holz, "On network operating system security," Networks, vol. 26, no. 1, pp. 6-24, Jan. 2016.
-
(2016)
Networks
, vol.26
, Issue.1
, pp. 6-24
-
-
Röpke, C.1
Holz, T.2
-
26
-
-
84963935825
-
OpenSec: Policy-based security using software-de-ned networking
-
Mar.
-
A. Lara and B. Ramamurthy, "OpenSec: Policy-based security using software-de-ned networking," IEEE Trans. Netw. Ser. Manage., vol. 13, no. 1, pp. 30-42, Mar. 2016.
-
(2016)
IEEE Trans. Netw. Ser. Manage
, vol.13
, Issue.1
, pp. 30-42
-
-
Lara, A.1
Ramamurthy, B.2
-
27
-
-
84894235329
-
Game theory applied to big data analytics in geosciences and remote sensing
-
Jul.
-
L. M. Bruce, "Game theory applied to big data analytics in geosciences and remote sensing," in Proc. IEEE Int. Geosci. Remote Sens. Symp. (IGARSS), Jul. 2013, pp. 4094-4097.
-
(2013)
Proc. IEEE Int. Geosci. Remote Sens. Symp. (IGARSS)
, pp. 4094-4097
-
-
Bruce, L.M.1
-
28
-
-
78650626363
-
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
-
San Diego, CA, USA
-
Q. Wu, S. Shiva, S. Roy, C. Ellis, and V. Datla, "On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks," in Proc. Spring Simul. Multiconf., San Diego, CA, USA, 2010, pp. 159:1-159:8.
-
(2010)
Proc. Spring Simul. Multiconf
, pp. 1591-1598
-
-
Wu, Q.1
Shiva, S.2
Roy, S.3
Ellis, C.4
Datla, V.5
-
29
-
-
79961201214
-
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly-ows
-
Apr.
-
H. S. Bedi, S. Roy, and S. Shiva, "Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly-ows," in Proc. IEEE Symp. Comput. Intell. Cyber Secur. (CICS), Apr. 2011, pp. 129-136.
-
(2011)
Proc. IEEE Symp. Comput. Intell. Cyber Secur. (CICS)
, pp. 129-136
-
-
Bedi, H.S.1
Roy, S.2
Shiva, S.3
-
30
-
-
77951729734
-
A survey of game theory as applied to network security
-
Jan.
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q.Wu, "A survey of game theory as applied to network security," in Proc. 43rd Hawaii Int. Conf. Syst. Sci. (HICSS), Jan. 2010, pp. 1-10.
-
(2010)
Proc. 43rd Hawaii Int. Conf. Syst. Sci. (HICSS)
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
31
-
-
0003427725
-
-
Cambridge, MA, USA: MIT Press
-
M. J. Osborne and A. Rubinstein, A Course in Game Theory, 1st ed. Cambridge, MA, USA: MIT Press, 1994.
-
(1994)
A Course in Game Theory, 1st ed
-
-
Osborne, M.J.1
Rubinstein, A.2
-
33
-
-
85134856905
-
-
Hoboken, NJ, USA: Wiley
-
R. L. Haupt and S. E. Haupt, Practical Genetic Algorithms, 2nd ed. Hoboken, NJ, USA: Wiley, 2004.
-
(2004)
Practical Genetic Algorithms, 2nd Ed
-
-
Haupt, R.L.1
Haupt, S.E.2
-
34
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
Jan.
-
S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, Jan. 2010.
-
(2010)
Appl. Soft Comput
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
36
-
-
83755179025
-
Comparison analysis of statistical control charts for quality monitoring of network traf-c forecasts
-
Oct.
-
R. Matias, A. M. M. Carvalho, L. B. Araujo, and P. R. M. Maciel, "Comparison analysis of statistical control charts for quality monitoring of network traf-c forecasts," in Proc. IEEE Int. Conf. Syst., Man, Cybern., Oct. 2011, pp. 404-409.
-
(2011)
Proc. IEEE Int. Conf. Syst., Man, Cybern
, pp. 404-409
-
-
Matias, R.1
Carvalho, A.M.M.2
Araujo, L.B.3
MacIel, P.R.M.4
-
38
-
-
0002021736
-
Equilibrium points in n-person games
-
J. F. Nash, Jr., "Equilibrium points in n-person games," Proc. Nat. Acad. Sci. USA, vol. 36, no. 1, pp. 48-49, 1950.
-
(1950)
Proc. Nat. Acad. Sci. USA
, vol.36
, Issue.1
, pp. 48-49
-
-
Nash, Jr.J.F.1
|