Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing
暂无分享,去创建一个
Y. Pan | Y. S. Dai | Y. P. Xiang | Yi Pan | Yuan-Shun Dai | Y. Xiang
[1] Minyi Guo,et al. Network attacks and defense systems , 2008 .
[2] Fabio Massacci,et al. Interactive access control for autonomic systems: From theory to implementation , 2008, TAAS.
[3] Yuan-Shun Dai,et al. Consequence Oriented Self-Healing and Hybrid Diagnosis Integrating Decision Diagram, Fuzzy Logic and Neural Network , 2007, Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07).
[4] Robert K. Cunningham,et al. Detecting and displaying novel computer attacks with Macroscope , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[5] Yi Pan,et al. A Hierarchical Modeling and Analysis for Grid Service Reliability , 2007, IEEE Transactions on Computers.
[6] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[7] Xiaohong Guan,et al. Autonomic and Dependable Computing: Moving Towards a Model-Driven Approach , 2006 .
[8] Wanlei Zhou,et al. Information theory based detection against network behavior mimicking DDoS attacks , 2008, IEEE Communications Letters.
[9] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[10] S. Hyakin,et al. Neural Networks: A Comprehensive Foundation , 1994 .
[11] Noah Treuhaft,et al. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies , 2002 .
[12] Richard D. Braatz,et al. Fault Detection and Diagnosis in Industrial Systems , 2001 .
[13] Yuan-Shun Dai,et al. Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[14] Zhang Shu,et al. Denying Denial-of-Service Attacks: A Router Based Solution , 2003, International Conference on Internet Computing.
[15] Wanlei Zhou,et al. Protecting information infrastructure from DDoS attacks by MADF , 2006, Int. J. High Perform. Comput. Netw..
[16] Angelos D. Keromytis,et al. SOS: an architecture for mitigating DDoS attacks , 2004, IEEE Journal on Selected Areas in Communications.
[17] Yuan-Shun Dai. Autonomic Computing and Reliability Improvement , 2005, ISORC.
[18] Bharat K. Bhargava,et al. A scheme for privacy-preserving data dissemination , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[19] Minyi Guo,et al. Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[20] Yi Pan,et al. ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs , 2006, EURASIP J. Wirel. Commun. Netw..
[21] Jonathan D. Cryer,et al. Time Series Analysis , 1986 .
[22] Elisa Bertino,et al. A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[23] G. McLachlan. Discriminant Analysis and Statistical Pattern Recognition , 1992 .
[24] Yuan-Shun Dai,et al. Modeling for NASA Autonomous Nano-Technology Swarm Missions and Model-Driven Autonomic Computing , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).