注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Denial-of-Service Detection.
作者:
George Kesidis
DOI:
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
2
下载资源
1
uni-trier.de
本地加速
doi.org
本地加速
uni-trier.de
PDF
下载加速
参考文章
(11)
1.
R.R. Brooks,
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
CRC Press.
,(2004) ,
10.1201/9781420038880
2.
Alfonso Valdes, Keith Skinner,
Adaptive, Model-Based Monitoring for Cyber Attack Detection
recent advances in intrusion detection.
pp. 80- 92 ,(2000) ,
10.1007/3-540-39945-3_6
3.
Jelena Mirkovic, Peter Reiher,
A taxonomy of DDoS attack and DDoS defense mechanisms
acm special interest group on data communication.
,vol. 34, pp. 39- 53 ,(2004) ,
10.1145/997150.997156
4.
Alfonso Valdes, Keith Skinner,
Probabilistic Alert Correlation
recent advances in intrusion detection.
pp. 54- 68 ,(2001) ,
10.1007/3-540-45474-8_4
5.
J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher, R.K. Thomas,
Accurately Measuring Denial of Service in Simulation and Testbed Experiments
IEEE Transactions on Dependable and Secure Computing.
,vol. 6, pp. 81- 95 ,(2009) ,
10.1109/TDSC.2008.73
6.
Haining Wang, Danlu Zhang, Kang G. Shin,
Detecting SYN flooding attacks
international conference on computer communications.
,vol. 3, pp. 1530- 1539 ,(2002) ,
10.1109/INFCOM.2002.1019404
7.
Harold S. Javitz, Alfonso Valdes,
The NIDES Statistical Component Description and Justification
,(1994)
8.
Debin Gao, Michael K. Reiter, Dawn Song,
Behavioral Distance Measurement Using Hidden Markov Models
Lecture Notes in Computer Science.
,vol. 4219, pp. 19- 40 ,(2006) ,
10.1007/11856214_2
9.
Judith Worell,
SOS
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '02.
,vol. 32, pp. 61- 72 ,(2002) ,
10.1145/633025.633032
10.
G. Carl, G. Kesidis, R.R. Brooks, Suresh Rai,
Denial-of-service attack-detection techniques
IEEE Internet Computing.
,vol. 10, pp. 82- 89 ,(2006) ,
10.1109/MIC.2006.5
来源期刊
Encyclopedia of Cryptography and Security (2nd Ed.)
2011 年,
Volume: , Issue: ,
Page: 323-328
相似文章
1
COLIDE: a collaborative intrusion detection framework for Internet of Things
iet networks
,2019
,
引用:
19
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...