Author:
Shaik Mohammed Penukonda Qubeb,Paramasivam Ilango
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Cognitive Neuroscience,Computer Vision and Pattern Recognition,Mathematics (miscellaneous)
Reference29 articles.
1. Zhou Z, Xie D, Xiong W (2009) A novel distributed detection scheme against DDoS attack. J Netw 4(9):921–928
2. Prabha S, Anitha R (2010) Mitigation of application traffic DDoS attacks with trust and AM based HMM models. Int J Comput Appl 6(9):26–34
3. Wang K, Huang C-Y, Lin S-J, Lin Y-D (2011) A fuzzy pattern-based filtering algorithm for botnet detection. Comput Netw 55:3275–3286
4. Liu T, Wang Z, Wang H, Lu K (2012) An entropy-based method for attack detection in large scale network. Int J Comput Commun 7(3):509–517
5. Xuan Y, Shin I, Thai MT, Znati T (2010) Detecting application denial-of-service attacks: a group-testing-based approach. IEEE Trans Parallel Distrib Syst 21(8):1203–1216
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献