作者: Stavros N. Shiaeles , Vasilios Katos , Alexandros S. Karakos , Basil K. Papadopoulos
DOI: 10.1016/J.COSE.2012.06.002
关键词: Data mining 、 Fuzzy logic 、 Estimator 、 Denial-of-service attack 、 Identification (information) 、 Network packet 、 Computer science 、 Event (probability theory)
摘要: … We have imposed strict real time constraints for the first challenge and more relaxed constraints for the identification of addresses. Through empirical evaluation we confirmed that the …