4.6 Article

Entropy-Based Economic Denial of Sustainability Detection

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Building an open source cloud environment with auto-scaling resources for executing bioinformatics and biomedical workflows

Michael T. Krieger et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Review Computer Science, Hardware & Architecture

Cloud security issues and challenges: A survey

Ashish Singh et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid

Kun Wang et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Computer Science, Interdisciplinary Applications

MERRA Analytic Services: Meeting the Big Data challenges of climate science through cloud-enabled Climate Analytics-as-a-Service

John L. Schnase et al.

COMPUTERS ENVIRONMENT AND URBAN SYSTEMS (2017)

Article Computer Science, Information Systems

MLP-GA based algorithm to detect application layer DDoS attack

Khundrakpam Johnson Singh et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)

Review Computer Science, Information Systems

DDoS attacks in cloud computing: Issues, taxonomy, and future directions

Gaurav Somani et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

DDoS in the IoT: Mirai and Other Botnets

Constantinos Kolias et al.

COMPUTER (2017)

Article Computer Science, Information Systems

Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges

Karanpreet Singh et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Hardware & Architecture

Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks

Zubair A. Baig et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Hardware & Architecture

DDoS attacks in cloud computing: Collateral damage to non-targets

Gaurav Somani et al.

COMPUTER NETWORKS (2016)

Article Physics, Multidisciplinary

Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

Khundrakpam Johnson Singh et al.

ENTROPY (2016)

Article Computer Science, Theory & Methods

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

Joseph K. Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Environmental Sciences

Auto-Scaling of Geo-Based Image Processing in an OpenStack Cloud Computing Environment

Sanggoo Kang et al.

REMOTE SENSING (2016)

Article Physics, Multidisciplinary

An Entropy-Based Network Anomaly Detection Method

Przemyslaw Berezinski et al.

ENTROPY (2015)

Article Computer Science, Theory & Methods

Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter

Guang Yao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Artificial Intelligence

An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection

Monowar H. Bhuyan et al.

PATTERN RECOGNITION LETTERS (2015)

Article Computer Science, Information Systems

Uniform DoS traceback

Mohammed N. Alenezi et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Theory & Methods

Detection and defense of application-layer DDoS attacks in backbone web traffic

Wei Zhou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Theory & Methods

An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks

EunHee Jeong et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Theory & Methods

Can We Beat DDoS Attacks in Clouds?

Shui Yu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Review Engineering, Electrical & Electronic

A review of novelty detection

Marco A. F. Pimentel et al.

SIGNAL PROCESSING (2014)

Article Telecommunications

A Rank Correlation Based Detection against Distributed Reflection DoS Attacks

Wei Wei et al.

IEEE COMMUNICATIONS LETTERS (2013)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Mathematics, Applied

Model identification of ARIMA family using genetic algorithms

CS Ong et al.

APPLIED MATHEMATICS AND COMPUTATION (2005)

Article Engineering, Electrical & Electronic

Modeling Internet backbone traffic at the flow level

C Barakat et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2003)