相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Energy efficiency maximization algorithm for underwater Mobile sensor networks
Subbulakshmi Pasupathi et al.
EARTH SCIENCE INFORMATICS (2021)
Clustering based semi-supervised machine learning for DDoS attack classification
Mohammad Misbahuddin et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2021)
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
S. Vimal et al.
COMPUTER COMMUNICATIONS (2020)
Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud
Mohamed El Ghazouani et al.
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE (2020)
Blockverse: A Cloud Blockchain-based Platform for Tracking in Affiliate Systems
A. Baldominos et al.
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE (2020)
A comprehensive survey on network anomaly detection
Gilberto Fernandes et al.
TELECOMMUNICATION SYSTEMS (2019)
A holistic review of Network Anomaly Detection Systems: A comprehensive survey
Nour Moustafa et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks
Bhuvaneswari N. G. Amma et al.
NEUROCOMPUTING (2019)
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning
Francisco Sales de Lima Filho et al.
SECURITY AND COMMUNICATION NETWORKS (2019)
Dynamic Network Anomaly Detection System by Using Deep Learning Techniques
Peng Lin et al.
CLOUD COMPUTING - CLOUD 2019 (2019)
Intrusion detection of distributed denial of service attack in cloud
S. Velliangiri et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks
S. Vimal et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
A novel statistical technique for intrusion detection systems
Enamul Kabir et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A statistical and distributed packet filter against DDoS attacks in Cloud environment
Vikash C. Pandey et al.
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES (2018)
Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine
Yadigar Imamverdiyev et al.
BIG DATA (2018)
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing
Jieren Cheng et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives
Yuan Cao et al.
IEEE ACCESS (2018)
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
Chuanlong Yin et al.
IEEE ACCESS (2017)
A survey and taxonomy of DoS attacks in cloud computing
Mohammad Masdari et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
Denial of service attacks - an updated perspective
Gulshan Kumar
SYSTEMS SCIENCE & CONTROL ENGINEERING (2016)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Zhiyuan Tan et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
Francesco Palmieri et al.
JOURNAL OF SUPERCOMPUTING (2015)
A survey of emerging threats in cybersecurity
Julian Jang-Jaccard et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)
Network attacks: Taxonomy, tools and systems
N. Hoque et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
Saman Taghavi Zargar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers
Ming-Yang Su
EXPERT SYSTEMS WITH APPLICATIONS (2011)