Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. The Enterprise guide to DDoS Protection. Technical Report, Arbor White paper (2013)
2. Ten Days of Rain. Technical Report, McAfee White paper (2011)
3. RioRey Taxonomy of DDoS attacks. Technical Report, RioRey White paper (2011)
4. Zhou, Z.H., Li, M.: Tri-training: Exploiting unlabeled data using three classifiers. IEEE T. on Knowledge and Data Mining 17(11), 1529–1541 (2005)
5. Ren, X., Wang, R., Wang, H.: Wavelet analysis method for detection of DDoS attack on the basis of self-similarity. Frontiers of Electrical and Electronics Engineering in China 2(1), 73–77 (2007)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey on the Applications of Semi-supervised Learning to Cyber-security;ACM Computing Surveys;2024-06-22
2. Abnormal Behavior Detection to Avoid Attacks in Cloud based on Association Rules;2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS);2023-12-11
3. An Autoencoder-based Efficient Scheme for DDoS Detection;2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3);2023-06-08
4. A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification;Algorithms and Architectures for Parallel Processing;2022
5. A generalized machine learning‐based model for the detection of DDoS attacks;International Journal of Network Management;2020-12-28