A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks
暂无分享,去创建一个
Naixue Xiong | Jun Li | Hanping Hu | Jun Yu Li | Qiao Ke | Hanping Hu | N. Xiong | Qiao Ke
[1] Uma Rathore Bhatt,et al. DDOS Attack Aware DSR Routing Protocol in WSN , 2016 .
[2] Geert Deconinck,et al. A Four-StepTechnique forTackling DDoS Attacks , 2012, ANT/MobiWIS.
[3] S. Selvakumar,et al. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..
[4] Steve Mansfield-Devine,et al. The growth and evolution of DDoS , 2015, Netw. Secur..
[5] Zeng Fan-hua. Minority Game with Incomplete Strategies , 2006 .
[6] Wu Xiaoping. Active defense strategy selection based on non-zero-sum attack-defense game model , 2013 .
[7] Zhiyang Li,et al. Detecting DDoS attacks against data center with correlation analysis , 2015, Comput. Commun..
[8] Krishan Kumar,et al. A comprehensive approach to discriminate DDoS attacks from flash events , 2016, J. Inf. Secur. Appl..
[9] Raimo Kantola,et al. Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory , 2014, Comput. Secur..
[10] Theodore Tryfonas,et al. A game theoretic defence framework against DoS/DDoS cyber attacks , 2013, Comput. Secur..
[11] Weifeng Chen,et al. Flow level detection and filtering of low-rate DDoS , 2012, Comput. Networks.
[12] Florian Malecki. Simple ways to dodge the DDoS bullet , 2012, Netw. Secur..
[13] Cheng Yang,et al. The minority game with incomplete strategies , 2007 .
[14] Vern Paxson,et al. Computing TCP's Retransmission Timer , 2000, RFC.
[15] C. Genest,et al. Statistical Inference Procedures for Bivariate Archimedean Copulas , 1993 .
[16] H. F. Chau,et al. Minority game with peer pressure , 2004 .
[17] Sankardas Roy,et al. Mitigating congestion based DoS attacks with an enhanced AQM technique , 2015, Comput. Commun..
[18] Richard E. Overill,et al. Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.
[19] Marina Papatriantafilou,et al. STONE: A streaming DDoS defense framework , 2015, Expert Syst. Appl..
[20] Meng Chao,et al. Neural network ensembles based on copula methods and Distributed Multiobjective Central Force Optimization algorithm , 2014, Eng. Appl. Artif. Intell..
[21] Jinjun Chen,et al. A confidence-based filtering method for DDoS attack defense in cloud environment , 2013, Future Gener. Comput. Syst..
[22] Bill Ravens,et al. An Introduction to Copulas , 2000, Technometrics.
[23] Dong Seong Kim,et al. Detection of DDoS attacks using optimized traffic matrix , 2012, Comput. Math. Appl..
[24] L. Engqvist,et al. Male birch catkin bugs vary copula duration to invest more in matings with novel females , 2015, Animal Behaviour.
[25] Fang Chen,et al. Prediction of stock markets by the evolutionary mix-game model , 2008 .
[26] Ming Li,et al. Change trend of averaged Hurst parameter of traffic under DDOS flood attacks , 2006, Comput. Secur..
[27] Giovanna Devetag,et al. A laboratory experiment on the minority game , 2003 .
[28] Yasir Malik,et al. Collaborative Peer to Peer Defense Mechanism for DDoS Attacks , 2011, ANT/MobiWIS.
[29] Ki Hoon Kwon,et al. DDoS attack detection method using cluster analysis , 2008, Expert Syst. Appl..
[30] Miroslav Voznak,et al. Whispering through DDoS attack , 2016 .
[31] Vasilios Katos,et al. Real time DDoS detection using fuzzy estimators , 2012, Comput. Secur..
[32] Mansfield-DevineSteve. The growth and evolution of DDoS , 2015 .
[33] Abe Sklar,et al. Random variables, joint distribution functions, and copulas , 1973, Kybernetika.
[34] Martin J. Reed,et al. Uniform DoS traceback , 2014, Comput. Secur..
[35] Kannan Govindarajan,et al. DDoS defense system for web services in a cloud environment , 2014, Future generations computer systems.
[36] Jugal K. Kalita,et al. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection , 2015, Pattern Recognit. Lett..
[37] Hannes Kazianka,et al. Copula-based geostatistical modeling of continuous and discrete data including covariates , 2010 .
[38] Wang Zu-x. Fair and efficient network congestion control algorithm based on minority game with local information , 2014 .
[39] Yi-Cheng Zhang,et al. Emergence of cooperation and organization in an evolutionary game , 1997 .