-
1
-
-
0038119011
-
Distributed denial of service characterization
-
Sandia National Laboratories
-
T. Draelos, et. AI, "Distributed Denial of Service Characterization," Technical Report, Sandia National Laboratories, 2003.
-
(2003)
Technical Report
-
-
Draelos, T.1
-
3
-
-
9444235799
-
Analysis of denial of service attacks using an address resolution protocol attack
-
US Military Academy
-
W. J. Blackert, D. C. Furnanage, and Y. A. Koukoulas, "Analysis of Denial of service attacks Using An address Resolution Protocol Attack, " Proceedings of the 2002 IEEE Workshop on Information Assurance. US Military Academy, 2002, pp. 17-22.
-
(2002)
Proceedings of the 2002 IEEE Workshop on Information Assurance
, pp. 17-22
-
-
Blackert, W.J.1
Furnanage, D.C.2
Koukoulas, Y.A.3
-
4
-
-
84898276661
-
Requirements for a general framework for response to distributed denial of service
-
D. W. Gresty, Q. Shi, and M. Merabti, "Requirements for a general framework for response to distributed denial of service," Seventeenth Annual Computer Security Applications Conference, 2001, pp. 422-229.
-
(2001)
Seventeenth Annual Computer Security Applications Conference
, pp. 422-1229
-
-
Gresty, D.W.1
Shi, Q.2
Merabti, M.3
-
5
-
-
1642283261
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Department of Computer Science, UCLA
-
J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Technical Report # 020017, Department of Computer Science, UCLA, 2002.
-
(2002)
Technical Report # 020017
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
6
-
-
0034776786
-
On the effectiveness of router-based packet filtering for distributed DoS attack and prevention in power-law internets
-
K. Park, and H. Lee, "On the Effectiveness of Router-Based Packet Filtering for Distributed DoS attack and Prevention in Power-Law Internets," Proceedings of the SGICOMM'01, 2001, pp. 15-26.
-
(2001)
Proceedings of the SGICOMM'01
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
7
-
-
9444231917
-
Defeating against large scale denial of service attack
-
US Military Academy
-
S. Mohiuddin, S. Hershkop, R. Bhan, S. Stolfo, "Defeating Against Large Scale Denial of Service Attack," Proceedings of the 2002 IEEE Workshop on Information Assurance. US Military Academy, 2002, pp. 139-146.
-
(2002)
Proceedings of the 2002 IEEE Workshop on Information Assurance
, pp. 139-146
-
-
Mohiuddin, S.1
Hershkop, S.2
Bhan, R.3
Stolfo, S.4
-
8
-
-
1542492748
-
Identifying significant features for network forensic analysis using artificial intelligence techniques
-
S. Mukkamala, and A. H. Sung, "Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques," In International Journal on Digital Evidence, IJDE Volume 1, Issue 4.
-
International Journal on Digital Evidence, IJDE
, vol.1
, Issue.4
-
-
Mukkamala, S.1
Sung, A.H.2
-
12
-
-
85141038051
-
Mining audit data to build intrusion detection models
-
honorable mention best application paper
-
W. Lee, S. J. Stolfo, and K. Mok, "Mining Audit Data to Build Intrusion Detection Models," Proceedings of the KDD-98, honorable mention best application paper, 1998.
-
(1998)
Proceedings of the KDD-98
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
16
-
-
0002432565
-
Multivariate adaptive regression splines
-
J. H. Friedman, Multivariate Adaptive Regression Splines, Annals of Statistics, Vol 19, 1991, pp. 1-141.
-
(1991)
Annals of Statistics
, vol.19
, pp. 1-141
-
-
Friedman, J.H.1
-
17
-
-
0004054215
-
-
San Diego, CA: Salford Systems
-
D. Steinberg, P. L. Colla, and K. Martin, "MARS User Guide," San Diego, CA: Salford Systems, 1999.
-
(1999)
MARS User Guide
-
-
Steinberg, D.1
Colla, P.L.2
Martin, K.3
-
18
-
-
0003479517
-
-
Morgan Kaufmann Publishers, Inc
-
W. Banzhaf, P. Nordin, R. E. Keller, and F. D. Francone, "Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and its Applications," Morgan Kaufmann Publishers, Inc, 1998.
-
(1998)
Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and Its Applications
-
-
Banzhaf, W.1
Nordin, P.2
Keller, R.E.3
Francone, F.D.4
-
19
-
-
9444298063
-
-
AIMLeaming Technology, http://www.aimleaming.com.
-
-
-
-
21
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, G. Janoski, and A. H. Sung, "Intrusion Detection Using Neural Networks and Support Vector Machines," Proceedings of IEEE International Joint Conference on Neural Networks, 2002, pp.1702-1707.
-
(2002)
Proceedings of IEEE International Joint Conference on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.H.3
|