共 50 条
- [1] Source Detection of SYN Flooding Attacks [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 40 - +
- [2] Detection of SYN flooding attacks using linear prediction analysis [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 218 - +
- [3] Network Attacks Detection Using Fuzzy Logic [J]. 2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015, : 243 - 244
- [4] Detecting SYN flooding attacks [J]. IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1530 - 1539
- [5] A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2017), PT II, 2017, 10192 : 14 - 22
- [6] Application of anomaly detection algorithms for detecting SYN flooding attacks [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2050 - 2054
- [7] Multi-Phase Detection of Spoofed SYN Flooding Attacks [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (03): : 23 - 31
- [9] Detection of HTTP flooding attacks in cloud using fuzzy bat clustering [J]. Neural Computing and Applications, 2020, 32 : 9603 - 9619
- [10] Detection of HTTP flooding attacks in cloud using fuzzy bat clustering [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (13): : 9603 - 9619