-
1
-
-
85027037644
-
Denial of service attacks and mitigation techniques: Real time implementation with detailed analysis
-
University of Esse
-
R. Subramani and R. Sridhar, "Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis, " manuscript, School of Computer Science and Electronic Engineering, University of Esse, 2011.
-
(2011)
Manuscript, School of Computer Science and Electronic Engineering
-
-
Subramani, R.1
Sridhar, R.2
-
3
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-The-Art
-
C. Douligeris and A. Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-The-Art, " Computer Networks, vol. 44, no. 5, pp. 643-666, 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
5
-
-
85084163167
-
Multops: A data-structure for bandwidth attack detection
-
T. M. Gil and M. Poletto, "Multops: A data-structure for bandwidth attack detection, " in USENIX Security Symposium, 2001, pp. 23-38.
-
(2001)
USENIX Security Symposium
, pp. 23-38
-
-
Gil, T.M.1
Poletto, M.2
-
6
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
GLOBECOM'03. IEEE, IEEE
-
S. Abdelsayed, D. Glimsholt, C. Leckie, S. Ryan, and S. Shami, "An efficient filter for denial-of-service bandwidth attacks, " in Global Telecommunications Conference, 2003. GLOBECOM'03. IEEE, vol. 3. IEEE, 2003, pp. 1353-1357.
-
(2003)
Global Telecommunications Conference, 2003
, vol.3
, pp. 1353-1357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
Shami, S.5
-
7
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, "An intrusion-detection model, " Software Engineering, IEEE Transactions on, no. 2, pp. 222-232, 1987.
-
(1987)
Software Engineering, IEEE Transactions on
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
9
-
-
84964411176
-
Real time data mining-based intrusion detection
-
IEEE
-
W. Lee, S. J. Stolfo, P. K. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, and J. Zhang, "Real time data mining-based intrusion detection, " in DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings, vol. 1. IEEE, 2001, pp. 89-100.
-
(2001)
DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings
, vol.1
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
10
-
-
0027150412
-
USTAT: A real-Time intrusion detection system for UNIX
-
IEEE
-
K. Ilgun, "USTAT: A real-Time intrusion detection system for UNIX, " in Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on. IEEE, 1993, pp. 16-28.
-
(1993)
Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on
, pp. 16-28
-
-
Ilgun, K.1
-
11
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
IEEE
-
S. Mukkamala, G. Janoski, and A. Sung, "Intrusion detection using neural networks and support vector machines, " in Neural Networks, 2002. IJCNN'02. Proceedings of the 2002 International Joint Conference on, vol. 2. IEEE, 2002, pp. 1702-1707.
-
(2002)
Neural Networks, 2002. IJCNN'02. Proceedings of the 2002 International Joint Conference on
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
12
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
M. Tavallaee, E. Bagheri, W. Lu, and A.-A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set, " in Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009, 2009.
-
(2009)
Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.-A.4
-
13
-
-
80555140075
-
Scikit-learn: Machine learning in python
-
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, "Scikit-learn: Machine Learning in Python, " Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011.
-
(2011)
Journal of Machine Learning Research
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
Varoquaux, G.2
Gramfort, A.3
Michel, V.4
Thirion, B.5
Grisel, O.6
Blondel, M.7
Prettenhofer, P.8
Weiss, R.9
Dubourg, V.10
Vanderplas, J.11
Passos, A.12
Cournapeau, D.13
Brucher, M.14
Perrot, M.15
Duchesnay, E.16
-
14
-
-
85027004522
-
-
Scikit-learn.org, ", ", [Online; accessed 27-March-2016]. [Online]. Available
-
Scikit-learn.org, "1.9. Naive Bayes scikit-learn 0.17.1 documentation, " 2016, [Online; accessed 27-March-2016]. [Online]. Available: http://scikit-learn.org/stable/modules/naivebayes.html.
-
(2016)
1.9. Naive Bayes Scikit-learn 0.17.1 Documentation
-
-
|