• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4600962)   Today's Articles (1934)   Subscriber (49363)
For: Li M. Change trend of averaged Hurst parameter of traffic under DDOS flood attacks. Comput Secur 2006. [DOI: 10.1016/j.cose.2005.11.007] [Citation(s) in RCA: 38] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
Number Cited by Other Article(s)
1
Li Z, Xing W, Khamaiseh S, Xu D. Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2019.2959268] [Citation(s) in RCA: 19] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
2
Kaur G, Saxena V, Gupta J. Detection of TCP targeted high bandwidth attacks using self-similarity. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2020. [DOI: 10.1016/j.jksuci.2017.05.004] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
3
Li J, Hu H, Ke Q, Xiong N. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network. SENSORS (BASEL, SWITZERLAND) 2017;17:s17030553. [PMID: 28282962 PMCID: PMC5375839 DOI: 10.3390/s17030553] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/10/2016] [Accepted: 03/03/2017] [Indexed: 06/06/2023]
4
Lin HC, Lee G. Speedily, efficient and adaptive streaming algorithms for real-time detection of flooding attacks. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2016. [DOI: 10.3233/jifs-169077] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
5
Asymptotic identity in min-plus algebra: a report on CPNS. COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE 2011;2012:154038. [PMID: 21822446 PMCID: PMC3130958 DOI: 10.1155/2012/154038] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/23/2011] [Accepted: 04/20/2011] [Indexed: 11/20/2022]
6
Maciá-Fernández G, Díaz-Verdejo JE, García-Teodoro P. Evaluation of a low-rate DoS attack against application servers. Comput Secur 2008. [DOI: 10.1016/j.cose.2008.07.004] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA