1. [1] Li, M., "Change Trend of Averaged Hurst Parameter of Traffic under DDoS Flood Attacks", Computers & Security, Vol.25, No.3, pp.213-220 , (2006).
2. [2] Thottan, M. and Ji, C., "Anomaly Detection in IP Networks", IEEE Transaction on Signal Processing, Special Issue of Signal Processing in Networking, Vol.51, No.8, pp.2191-2204, (2003).
3. [3] Leland, W.E., Taqqu, M.S., Willinger, W. and Wilson, D.V., "On the Self-Similar Nature of Ethernet Traffic", Computer Communications Review, Vol.23, No.4, pp.183-193, (1993).
4. [4] Fukuda, K., Takayasu, M. and Takayasu, H., "Analysis of Minimal Model of Internet Traffic", Proc. of Traffic and Granular Flow '01, pp.381-400, (2001).
5. [5] Hagiwara, T., Doi, H., Tode, H. and Ikeda H., "High-Speed Calculation Method of the Hurst Parameter Based on Real Traffic", IEICE Transactions on Information and Systems, Vol.E84-D, No.5, pp.578-587, (2001).