Author:
Frazão Ivo,Abreu Pedro Henriques,Cruz Tiago,Araújo Hélder,Simões Paulo
Publisher
Springer International Publishing
Reference11 articles.
1. Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security: a survey. IEEE Internet Things J. 4(6), 1802–1831 (2017).
https://doi.org/10.1109/JIOT.2017.2703172
2. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013).
https://doi.org/10.1109/SURV.2013.031413.00127
3. Sabhnani, M., Serpen, G., More, K.K.: Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. In: Proceedings of International Conference on Machine Learning: Models, Technologies, and Applications (MLMTA), January 2003, pp. 209–215 (2003).
http://dl.acm.org/citation.cfm?id=1293805.1293811
4. Osanaiye, O., Cai, H., Choo, K.K.R., Dehghantanha, A., Xu, Z., Dlodlo, M.: Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. Eurasip J. Wirel. Commun. Netw. 2016(1), 130 (2016).
https://doi.org/10.1186/s13638-016-0623-3
5. Su, M.Y.: Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst. Appl. 38(4), 3492–3498 (2011).
https://doi.org/10.1016/j.eswa.2010.08.137
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献