注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Speedily, efficient and adaptive streaming algorithms for real-time detection of flooding attacks
作者: Hsin-Chang Lin , Guanling Lee
DOI:
10.3233/JIFS-169077
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
3
下载资源
2
uni-trier.de
本地加速
iospress.com
本地加速
doi.org
本地加速
uni-trier.de
PDF
下载加速
sci-hub.se
PDF
下载加速
参考文章
(27)
1.
D.W. Gresty, Q. Shi, M. Merabti,
Requirements for a general framework for response to distributed denial-of-service
annual computer security applications conference.
pp. 422- 429 ,(2001) ,
10.1109/ACSAC.2001.991559
2.
Lihua Miao, Wei Ding, Jian Gong,
A real-time method for detecting internet-wide SYN flooding attacks
workshop on local and metropolitan area networks.
pp. 1- 6 ,(2015) ,
10.1109/LANMAN.2015.7114740
3.
Jonathon Ng, Deepti Joshi, Shankar M. Banik,
Applying Data Mining Techniques to Intrusion Detection
international conference on information technology: new generations.
pp. 800- 801 ,(2015) ,
10.1109/ITNG.2015.146
4.
Jia Yang, Hao Ma, Bei Zhang, Ping Chen,
An Efficient Approach for Analyzing Multidimensional Network Traffic
asia pacific network operations and management symposium.
pp. 227- 235 ,(2008) ,
10.1007/978-3-540-88623-5_23
5.
Vern Paxson, Stuart Staniford, Nicholas Weaver,
Very fast containment of scanning worms
usenix security symposium.
pp. 3- 3 ,(2004)
6.
Levent Ertoz, Aleksandar Lazarevic, Paul Dokas, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava,
Data Mining for Network Intrusion Detection
,(2002)
7.
Cristian Estan, George Varghese,
New directions in traffic measurement and accounting
Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement - IMW '01.
,vol. 32, pp. 323- 336 ,(2001) ,
10.1145/505202.505212
8.
Andrei Broder, Michael Mitzenmacher,
Network Applications of Bloom Filters: A Survey
Internet Mathematics.
,vol. 1, pp. 485- 509 ,(2004) ,
10.1080/15427951.2004.10129096
9.
Glenn Carl, Richard R. Brooks, Suresh Rai,
Wavelet based Denial-of-Service detection
Computers & Security.
,vol. 25, pp. 600- 615 ,(2006) ,
10.1016/J.COSE.2006.08.017
10.
Cristian Estan, George Varghese, Mike Fisk,
Bitmap algorithms for counting active flows on high speed links
internet measurement conference.
pp. 153- 166 ,(2003) ,
10.1145/948205.948225
来源期刊
Journal of Intelligent and Fuzzy Systems
IOS Press
2016 年,
Volume: 31, Issue: 4,
Page: 2363-2373
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...