相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Comparison between random forest and support vector machine algorithms for LULC classification
Cengiz Avci et al.
INTERNATIONAL JOURNAL OF ENGINEERING AND GEOSCIENCES (2023)
Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms
Juan A. Herrera-Silva et al.
SENSORS (2023)
Detection of HTTP DDoS Attacks Using NFStream and TensorFlow
Martin Chovanec et al.
APPLIED SCIENCES-BASEL (2023)
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset
Efstratios Chatzoglou et al.
COMPUTERS & SECURITY (2023)
Ransomware Detection Using the Dynamic Analysis and Machine Learning: A Survey and Research Directions
Umara Urooj et al.
APPLIED SCIENCES-BASEL (2022)
FACVSPO: Fractional anti corona virus student psychology optimization enabled deep residual network and hybrid correlative feature selection for distributed denial-of-service attack detection in cloud using spark architecture
Muthuperumal Periyaperumal Ramkumar et al.
INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING (2022)
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
Taief Alaa Al-Amiedy et al.
SENSORS (2022)
Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy
Ziyad R. Alashhab et al.
APPLIED SCIENCES-BASEL (2022)
An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks
A. Dhanapal et al.
WIRELESS NETWORKS (2021)
Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks
S. Velliangiri et al.
JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2021)
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed
Max Landauer et al.
IEEE TRANSACTIONS ON RELIABILITY (2021)
Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine
Gopal Singh Kushwah et al.
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES (2021)
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Abdullah Ahmed Bahashwan et al.
IEEE ACCESS (2021)
Detection of HTTP flooding attacks in cloud using fuzzy bat clustering
T. Raja Sree et al.
NEURAL COMPUTING & APPLICATIONS (2020)
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
R. Doriguzzi-Corin et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)
Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques
Abdul Raoof Wani et al.
PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI) (2019)
THE SLOW HTTP DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION IN CLOUD
A. Dhanapal et al.
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE (2019)
Intrusion detection of distributed denial of service attack in cloud
S. Velliangiri et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
THE SLOW HTTP DDOS ATTACKS: DETECTION, MITIGATION AND PREVENTION IN THE CLOUD ENVIRONMENT
A. Dhanapal et al.
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE (2019)
A novel approach to defend multimedia flash crowd in cloud environment
Kriti Bhushan et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
A systematic survey on multi-step attack detection
Julio Navarro et al.
COMPUTERS & SECURITY (2018)
A New Generalized Deep Learning Framework Combining Sparse Autoencoder and Taguchi Method for Novel Data Classification and Processing
Ahmad M. Karim et al.
MATHEMATICAL PROBLEMS IN ENGINEERING (2018)
Detection of HTTP Flooding Attacks in Cloud Using Dynamic Entropy Method
T. Raja Sree et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)
An anomaly-based approach for DDoS attack detection in cloud environment
Adnan Rawashdeh et al.
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY (2018)
Analyzing Social Media through Big Data using InfoSphere BigInsights and Apache Flume
Marouane Birjali et al.
8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS (2017)
Proposed DAD-match Security Technique based on Hash Function to Secure Duplicate Address Detection in IPv6 Link-local Network
Ahmed K. Al-Ani et al.
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2017) (2017)
Detecting Denial of Service Attacks in the Cloud
Raneel Kumar et al.
2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC (2016)
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
Junho Choi et al.
SOFT COMPUTING (2014)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi et al.
COMPUTERS & SECURITY (2012)
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Ashley Chonka et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
An Overview of IP Flow-Based Intrusion Detection
Anna Sperotto et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)
A workload characterization study of the 1998 World Cup Web site
M Arlitt et al.
IEEE NETWORK (2000)