Author:
Kokkonen Tero,Hämäläinen Timo,Silokunnas Marko,Siltanen Jarmo,Zolotukhin Mikhail,Neijonen Mikko
Publisher
Springer International Publishing
Reference30 articles.
1. JAMK University of Applied Sciences, Jyväskylä Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE).
http://www.jyvsectec.fi/en/rgce/
2. Zolotukhin, M., Hämäläinen, T., Kokkonen, T., Siltanen, J.: Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 406–411, August 2014
3. Floyd, S., Paxson, V.: Difficulties in Simulating the Internet. IEEE/ACM Trans. Netw. 9(4), 392–403 (2001)
4. Casilari, E., Gonzblez, F.J., Sandoval, F.: Modeling of HTTP traffic. Communications Letters, IEEE 5(6), 272–274 (2001)
5. Botta, A., Dainotti, A., Pescapè, A.: A tool for the generation of realistic network workload for emerging networking scenarios. Computer Networks (Elsevier) 14(15), 3531–3547 (2012)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献