FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing
暂无分享,去创建一个
[1] P. Vijaya,et al. Artificial neural network-based merging score for Meta search engine , 2016 .
[2] P. Ganeshkumar,et al. Adaptive Neuro-Fuzzy-Based Anomaly Detection System in Cloud , 2016, Int. J. Fuzzy Syst..
[3] Mohamed Cheriet,et al. Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing , 2015, J. Netw. Comput. Appl..
[4] P. Vijaya,et al. Fractional Lion Algorithm-An Optimization Algorithm for Data Clustering , 2016, J. Comput. Sci..
[5] Richard E. Overill,et al. Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.
[6] Manoj Kumar,et al. Crowd Behavior Recognition Using Hybrid Tracking Model and Genetic algorithm Enabled Neural Network , 2017, Int. J. Comput. Intell. Syst..
[7] Ganesh Kumar,et al. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.
[8] Wanlei Zhou,et al. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..
[9] F. Al-Haidari,et al. Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services , 2015 .
[10] Chih-Ming Chen,et al. An efficient fuzzy classifier with feature selection based on fuzzy entropy , 2001, IEEE Trans. Syst. Man Cybern. Part B.
[11] Thinagaran Perumal,et al. Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming , 2015, Neural Processing Letters.
[12] Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2014, International Journal of System Assurance Engineering and Management.
[13] Sivakami Raja,et al. An Efficient Fuzzy-Based Hybrid System to Cloud Intrusion Detection , 2016, International Journal of Fuzzy Systems.
[14] Zubair A. Baig,et al. Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks , 2016, Comput. Networks.
[15] S VivinSandar,et al. Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks , 2012 .
[16] Khaled Salah,et al. An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud , 2016 .