Related references
Note: Only part of the references are listed.A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks
M. Poongodi et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2014)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
Saman Taghavi Zargar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Efficient Computer Network Anomaly Detection by Changepoint Detection Methods
Alexander G. Tartakovsky et al.
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2013)
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Chun-Jen Chung et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
Xiaoyong Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance
Jonny Milliken et al.
IEEE WIRELESS COMMUNICATIONS LETTERS (2013)
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
Jerome Francois et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2012)
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
Fenye Bao et al.
IEEE Transactions on Network and Service Management (2012)
Hybrid trust and reputation management for sensor networks
Efthimia Aivaloglou et al.
WIRELESS NETWORKS (2010)
On scalable attack detection in the network
Ramana Rao Kompella et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2007)
Intrusion detection routers: Design, implementation. and evaluation using an experimental testbed
Eric Y. K. Chan et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)
A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
Alexander G. Tartakovsky et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2006)
Detecting and isolating malicious routers
Alper Tugay Mizrak et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)
DDoS attacks and defense mechanisms: classification and state-of-the-art
C Douligeris et al.
COMPUTER NETWORKS (2004)
A taxonomy of DDoS attack and DDoS Defense mechanisms
J Mirkovic et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2004)
A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles
F Luo et al.
BIOINFORMATICS (2004)
Network intrusion and fault detection: A statistical anomaly approach
C Manikopoulos et al.
IEEE COMMUNICATIONS MAGAZINE (2002)