-
2
-
-
85040332269
-
P.: 2014 Global report on the cost of cyber crime
-
Institute, P.: 2014 Global report on the cost of cyber crime. HP Enterprise Security p. 31 (2014)
-
(2014)
HP Enterprise Security
, pp. 31
-
-
-
3
-
-
85040328636
-
Layering based network intrusion detection system to enhance network attacks detection. Int
-
Yi, M.A.; Phyu, T.: Layering based network intrusion detection system to enhance network attacks detection. Int. J. Sci. Res. 2(9), 10091302 (2013)
-
(2013)
J. Sci. Res.
, vol.2
, Issue.9
, pp. 10091302
-
-
Yi, M.A.1
Phyu, T.2
-
4
-
-
79957530146
-
Low-rate DDoS attacks detection and traceback by using new information metrics
-
Xiang, Y.; Li, K.; Zhou, W.: Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans. Inf. Forensics Secur. 6, 426–437 (2011)
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
5
-
-
84904646449
-
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
-
Khan, S.; Shiraz, M.; Wahab, A.W.A.; Gani, A.; Han, Q.; Rahman, Z.B.A.: A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J. 2014, 547062 (2014). doi:10.1155/2014/547062
-
(2014)
Sci. World J
, vol.2014
-
-
Khan, S.1
Shiraz, M.2
Wahab, A.W.A.3
Gani, A.4
Han, Q.5
Rahman, Z.B.A.6
-
6
-
-
84978319091
-
Network forensics: review, taxonomy, and open challenges
-
Khan, S.; Gani, A.; Wahab, A.W.A.; Shiraz, M.; Ahmad, I.: Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66, 214–235 (2016)
-
(2016)
J. Netw. Comput. Appl.
, vol.66
, pp. 214-235
-
-
Khan, S.1
Gani, A.2
Wahab, A.W.A.3
Shiraz, M.4
Ahmad, I.5
-
7
-
-
17744370129
-
Low rate TCP denial-of-service attack detection at edge routers
-
Shevtekar, A.; Anantharam, K.; Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9, 363–365 (2005)
-
(2005)
IEEE Commun. Lett.
, vol.9
, pp. 363-365
-
-
Shevtekar, A.1
Anantharam, K.2
Ansari, N.3
-
10
-
-
84939936955
-
Shannon information entropy for an infinite circular well
-
Song, X.-D.; Sun, G.-H.; Dong, S.-H.: Shannon information entropy for an infinite circular well. Phys. Lett. A 379, 1402–1408 (2015)
-
(2015)
Phys. Lett. A
, vol.379
, pp. 1402-1408
-
-
Song, X.-D.1
Sun, G.-H.2
Dong, S.-H.3
-
11
-
-
84953896682
-
Fisher information and Shannon entropy of position-dependent mass oscillators
-
Macedo, D.; Guedes, I.: Fisher information and Shannon entropy of position-dependent mass oscillators. Phys. A Stat. Mech. Appl. 434, 211–219 (2015)
-
(2015)
Phys. A Stat. Mech. Appl.
, vol.434
, pp. 211-219
-
-
Macedo, D.1
Guedes, I.2
-
12
-
-
84919909185
-
Acoustic emission detection of rail defect based on wavelet transform and Shannon entropy
-
Zhang, X.; Feng, N.; Wang, Y.; Shen, Y.: Acoustic emission detection of rail defect based on wavelet transform and Shannon entropy. J. Sound Vib. 339, 419–432 (2015)
-
(2015)
J. Sound Vib.
, vol.339
, pp. 419-432
-
-
Zhang, X.1
Feng, N.2
Wang, Y.3
Shen, Y.4
-
13
-
-
84870053104
-
Local Shannon entropy measure with statistical tests for image randomness
-
Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.P.; Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)
-
(2013)
Inf. Sci.
, vol.222
, pp. 323-342
-
-
Wu, Y.1
Zhou, Y.2
Saveriades, G.3
Agaian, S.4
Noonan, J.P.5
Natarajan, P.6
-
14
-
-
85011382936
-
Concepts reduction in formal concept analysis with fuzzy setting using Shannon entropy
-
Singh, P.K.; Cherukuri, A.K.; Li, J.: Concepts reduction in formal concept analysis with fuzzy setting using Shannon entropy. Int. J. Mach. Learn. Cybernet. 8(1), 179–189 (2017)
-
(2017)
Int. J. Mach. Learn. Cybernet.
, vol.8
, Issue.1
, pp. 179-189
-
-
Singh, P.K.1
Cherukuri, A.K.2
Li, J.3
-
15
-
-
84942839237
-
Fuzzy concept lattice reduction using Shannon entropy and Huffman coding
-
Singh, P.K.; Gani, A.: Fuzzy concept lattice reduction using Shannon entropy and Huffman coding. J. Appl. Non-Classical Logics 25(2), 101–119 (2015)
-
(2015)
J. Appl. Non-Classical Logics
, vol.25
, Issue.2
, pp. 101-119
-
-
Singh, P.K.1
Gani, A.2
-
16
-
-
84896290706
-
Applications of entropy in finance: a review
-
Zhou, R.; Cai, R.; Tong, G.: Applications of entropy in finance: a review. Entropy 15, 4909–4931 (2013)
-
(2013)
Entropy
, vol.15
, pp. 4909-4931
-
-
Zhou, R.1
Cai, R.2
Tong, G.3
-
17
-
-
79551523280
-
Traceback of DDoS attacks using entropy variations
-
Yu, S.; Zhou, W.; Doss, R.; Jia, W.: Traceback of DDoS attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22, 412–425 (2011)
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
20
-
-
84884381061
-
Paper: natural computing: a problem solving paradigm with granular information processing
-
Pal, S.K.; Meher, S.K.: Paper: natural computing: a problem solving paradigm with granular information processing. Appl. Soft Comput. 13, 3944–3955 (2013)
-
(2013)
Appl. Soft Comput.
, vol.13
, pp. 3944-3955
-
-
Pal, S.K.1
Meher, S.K.2
-
21
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
Feinstein, L.; Schnackenberg, D.; Balupari, R.; Kindred, D.: Statistical approaches to DDoS attack detection and response. In: DARPA Information Survivability Conference and Exposition, 2003. Proceedings, pp. 303–314 (2003)
-
(2003)
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
22
-
-
34547584171
-
A lightweight intrusion detection model based on feature selection and maximum entropy model
-
Li, Y.; Fang, B.-X.; Chen, Y.; Guo, L.: A lightweight intrusion detection model based on feature selection and maximum entropy model. In: International Conference on Communication Technology ICCT’06. 2006, pp. 1–4 (2006)
-
(2006)
International Conference on Communication Technology ICCT’06. 2006
, pp. 1-4
-
-
Li, Y.1
Fang, B.-X.2
Chen, Y.3
Guo, L.4
-
23
-
-
77951110390
-
Entropy-based profiling of network traffic for detection of security attack
-
Lee, T.-H.; He, J.-D.: Entropy-based profiling of network traffic for detection of security attack. In: TENCON 2009-2009 IEEE Region 10 Conference, pp. 1–5 (2009)
-
(2009)
TENCON 2009-2009 IEEE Region 10 Conference
, pp. 1-5
-
-
Lee, T.-H.1
He, J.-D.2
-
24
-
-
78650311599
-
Adaptive clustering with feature ranking for DDoS attacks detection
-
Zi, L.; Yearwood, J.; Wu, X.-W.: Adaptive clustering with feature ranking for DDoS attacks detection. In: 4th International Conference on Network and System Security (NSS), 2010, pp. 281–286 (2010)
-
(2010)
4th International Conference on Network and System Security (NSS), 2010
, pp. 281-286
-
-
Zi, L.1
Yearwood, J.2
Wu, X.-W.3
-
25
-
-
83355167101
-
An entropy and volume-based approach for identifying malicious activities in honeynet traffic
-
Sqalli, M.H.; Firdous, S.N.; Baig, Z.; Azzedin, F.: An entropy and volume-based approach for identifying malicious activities in honeynet traffic. In: International Conference on Cyberworlds (CW). 2011, pp. 23–30 (2011)
-
(2011)
International Conference on Cyberworlds (CW). 2011
, pp. 23-30
-
-
Sqalli, M.H.1
Firdous, S.N.2
Baig, Z.3
Azzedin, F.4
-
30
-
-
84902167819
-
FL-LPVG: an approach for anomaly detection based on flow-level limited penetrable visibility graph
-
Luo, Y.; Wang, B.; Sun, Y.; Zhang, B.; Chen, X.: FL-LPVG: an approach for anomaly detection based on flow-level limited penetrable visibility graph. In: International Conference on Information and Network Security, ICINS 2013, Beijing. pp. 1–7 (2013). doi:10.1049/cp.2013.2470
-
(2013)
International Conference on Information and Network Security, ICINS 2013, Beijing
, pp. 1-7
-
-
Luo, Y.1
Wang, B.2
Sun, Y.3
Zhang, B.4
Chen, X.5
-
31
-
-
84886496924
-
A novel statistical technique for detection of DDoS attacks in KDDdataset,
-
Kaur, G.; Varma, S.; Jain, A.: “A novel statistical technique for detection of DDoS attacks in KDDdataset,” In: Contemporary Computing (IC3). Sixth International Conference on 2013, 393–398 (2013)
-
(2013)
Contemporary Computing (IC3). Sixth International Conference on 2013
, pp. 393-398
-
-
Kaur, G.1
Varma, S.2
Jain, A.3
-
32
-
-
84994407167
-
Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment
-
Priyanka, N.; Mishra, A.; et al.: Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. IJCSI Int. J. Comput. Sci. Issues 10(2), 142–146 (2013)
-
(2013)
IJCSI Int. J. Comput. Sci. Issues
, vol.10
, Issue.2
, pp. 142-146
-
-
Priyanka, N.1
Mishra, A.2
-
33
-
-
66649133397
-
FVBA: a combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain
-
Gupta, B.B.; Misra, M.; Joshi, R.C.: FVBA: a combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. In: 16th IEEE International Conference on Networks, 2008, ICON 2008, IEEE (2008)
-
(2008)
16th IEEE International Conference on Networks, 2008, ICON 2008, IEEE
-
-
Gupta, B.B.1
Misra, M.2
Joshi, R.C.3
-
34
-
-
84897500180
-
A novel solution to handle DDOS attack in MANET
-
Chhabra, M.; et al.: A novel solution to handle DDOS attack in MANET. J. Inf. Secur. 4(3), 153–165 (2013)
-
(2013)
J. Inf. Secur.
, vol.4
, Issue.3
, pp. 153-165
-
-
Chhabra, M.1
-
35
-
-
84897558662
-
An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET)
-
Chhabra, M.; Gupta, B.B.: An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res. J. Appl. Sci. Eng. Technol. 7(10), 2033–2039 (2014)
-
(2014)
Res. J. Appl. Sci. Eng. Technol.
, vol.7
, Issue.10
, pp. 2033-2039
-
-
Chhabra, M.1
Gupta, B.B.2
-
37
-
-
84963679961
-
Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
-
Gupta, B.B.; Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. (2016). doi:10.1007/s00521-016-2317-5
-
(2016)
Neural Comput. Appl.
-
-
Gupta, B.B.1
Badve, O.P.2
-
38
-
-
85068810383
-
Concept lattice reduction using difference subset of attributes as information granules
-
Singh, P.K.; Kumar, C.A.: Concept lattice reduction using difference subset of attributes as information granules. Granul. Comput. (2017). doi:10.1007/s41066-016-0036-z
-
(2017)
Granul. Comput.
-
-
Singh, P.K.1
Kumar, C.A.2
-
39
-
-
85011884955
-
Complex vague set based concept lattice
-
Singh, P.K.: Complex vague set based concept lattice. Chaos Solitons Fractals 96, 145–153 (2017)
-
(2017)
Chaos Solitons Fractals
, vol.96
, pp. 145-153
-
-
Singh, P.K.1
-
40
-
-
85011423354
-
Three-way fuzzy concept lattice representation using neutrosophic set
-
Singh, P.K.: Three-way fuzzy concept lattice representation using neutrosophic set. Int. J. Mach. Learn. Cybernet. 8(1), 69–79 (2017)
-
(2017)
Int. J. Mach. Learn. Cybernet.
, vol.8
, Issue.1
, pp. 69-79
-
-
Singh, P.K.1
|