Author:
Subburaj T.,Suthendran K.
Reference18 articles.
1. https://threatmap.checkpoint.com/
2. Nair S, Gautam N (2014) Entropy variation and J48 algorithm based intrusion detection system for cloud computing. Int J Comput Appl 103(11):8–14
3. Kaur G, Saxena V, Gupta JP (2020) Detection of TCP targeted high bandwidth attacks using self-similarity. J King Saud Univ Comput Inf Sci 32(1):35–49
4. Shojaei M, Movahhedinia N, Ladani BT (2011) An entropy approach for DDoS attack detection in IEEE 802.16 based networks. Lect Notes Comput Sci 7038:129–143
5. Akyazi U, Sima Uyar A (2012) Distributed detection of DDoS attacks during the intermediate phase through mobile agents. Comput Inform 31:759–778