Author:
Arshadi Laleh,Jahangir Amir Hossein
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference101 articles.
1. Arshadi L, Jahangir AH. On the TCP flow inter-arrival times distribution. In: Proceedings of the 5th European symposium on computer modeling and simulation, Madrid, Spain. November 2011. p. 360–5.
2. JPEG steganography detection with Benford's law;Andriotis;Digital Investigation,2013
3. Arshadi L, Jahangir AH. Entropy based SYN flooding detection. In: Proceedings of the 36th annual IEEE conference on local computer networks (LCN), Bonn, Germany. October 2011. p. 139–42.
4. Allen WH, Marin GA. The loss technique for detecting new denial of service attacks, In: Proceedings of IEEE SoutheastCon, Greensboro, NC, USA. March 2004. p. 302–9.
5. Evolutionary design of intrusion detection programs;Abraham;International Journal of Network Security,2007
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献