作者: Haining Wang , Danlu Zhang , K.G. Shin
DOI: 10.1109/TDSC.2004.34
关键词: Airfield traffic pattern 、 Computer network 、 CUSUM 、 Computer science 、 Denial-of-service attack 、 Intrusion detection system 、 Communications protocol 、 SYN flood 、 Flooding (computer networking) 、 Real-time computing 、 Change detection
摘要: … a simple and robust mechanism, called Change-Point Monitoring (CPM), to detect denial of … and is an instance of the Sequential Change Point Detection. To make the detection …