暂无分享,去创建一个
[1] Kai Hwang,et al. Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks , 2007, 2007 IEEE International Conference on Communications.
[2] Qi Shi,et al. Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks , 2005, SEC.
[3] Priyanka Jadhav,et al. Wireless Intrusion Detection System , 2010 .
[4] Kimmo Hiltunen,et al. WLAN Attacks and Risks , 2004 .
[5] Mohammad Abdollahi Azgomi,et al. A Taxonomy of Frauds and Fraud Detection Techniques , 2009, ICISTM.
[6] Hui Li,et al. A Parallel Intrusion Detection System for High-Speed Networks , 2004, ACNS.
[7] Hong Shen,et al. A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection , 2005, ISPEC.
[8] Mina Guirguis,et al. Exploiting the transients of adaptation for RoQ attacks on Internet resources , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[9] Amparo Alonso-Betanzos,et al. A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture , 2007, KES-AMSTA.
[10] Erland Jonsson,et al. A Multi-Sensor Model to Improve Automated Attack Detection , 2008, RAID.
[11] Yuting Zhang,et al. Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[12] Kai Hwang,et al. Filtering Shrew DDoS Attacks Using A New Frequency-Domain Approach , 2005 .