Author:
Feng Yaokai,Hori Yoshiaki,Sakurai Kouichi
Publisher
Springer International Publishing
Reference27 articles.
1. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;S Xu,2009
2. ComputerWeekly News. http://www.computerweekly.com/news/4500243431/DDoS-losses-potentially-100k-an-hour-survey-shows . Accessed 6 Nov 2016
3. Tang, Y.: Defending against internet worms: a signature-based approach. In: Proceedings of 24th IEEE Annual Joint Conference of the Computer and Communications Societies (INFOCOM), pp. 1384–1394 (2005)
4. Eskin, E., Lee, W.: Modeling system call for intrusion detection with dynamic window sizes. In: Proceedings of DARPA Information Survivalility Conference and Exposition (DISCEX), pp. 165–175 (2001)
5. Kind, A., Stoecklin, M.P., Dimitropoulos, X.: Histogram-based traffic anomaly detection. IEEE Trans. Netw. Serv. Manage. 6(2), 1–12 (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献