A statistical class center based triangle area vector method for detection of denial of service attacks
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A statistical class center based triangle area vector method for detection of denial of service attacks
Authors
Keywords
-
Journal
Cluster Computing-The Journal of Networks Software Tools and Applications
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-05-06
DOI
10.1007/s10586-020-03120-3
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Can machine learning model with static features be fooled: an adversarial machine learning approach
- (2020) Rahim Taheri et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
- (2020) R. Doriguzzi-Corin et al. IEEE Transactions on Network and Service Management
- Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks
- (2019) Bhuvaneswari Amma N.G. et al. NEUROCOMPUTING
- Semi-supervised machine learning approach for DDoS detection
- (2018) Mohamed Idhammad et al. APPLIED INTELLIGENCE
- DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment
- (2018) K. Munivara Prasad et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- DDoS attacks in cloud computing: Collateral damage to non-targets
- (2016) Gaurav Somani et al. Computer Networks
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges
- (2016) Qiao Yan et al. IEEE Communications Surveys and Tutorials
- A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection
- (2015) David J. Weller-Fahy et al. IEEE Communications Surveys and Tutorials
- Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
- (2015) Zhiyuan Tan et al. IEEE TRANSACTIONS ON COMPUTERS
- CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
- (2015) Wei-Chao Lin et al. KNOWLEDGE-BASED SYSTEMS
- Analysis of network traffic features for anomaly detection
- (2014) Félix Iglesias et al. MACHINE LEARNING
- Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems
- (2014) Abdelouahid Derhab et al. Security and Communication Networks
- A distance sum-based hybrid method for intrusion detection
- (2013) Chun Guo et al. APPLIED INTELLIGENCE
- A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
- (2013) Saman Taghavi Zargar et al. IEEE Communications Surveys and Tutorials
- Network Anomaly Detection: Methods, Systems and Tools
- (2013) Monowar H. Bhuyan et al. IEEE Communications Surveys and Tutorials
- A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
- (2013) Zhiyuan Tan et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Can We Beat DDoS Attacks in Clouds?
- (2013) Shui Yu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Network attacks: Taxonomy, tools and systems
- (2013) N. Hoque et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- RePIDS: A multi tier Real-time Payload-based Intrusion Detection System
- (2012) Aruna Jamdagni et al. Computer Networks
- A comparative study of efficient initialization methods for the k-means clustering algorithm
- (2012) M. Emre Celebi et al. EXPERT SYSTEMS WITH APPLICATIONS
- A triangle area based nearest neighbors approach to intrusion detection
- (2009) Chih-Fong Tsai et al. PATTERN RECOGNITION
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now