1 |
Xin Xu, Xuening Wang, "An adaptive network intrusion detection method based on PCA and support vector machines", ADMA 2005, LNAI 3584, pp. 696-703, 2005.
|
2 |
J Charzinski "HTTP/TCP connection and flow characteristics", Performance Evaluation, pp. 149-162, 2000.
|
3 |
H Sengar, D Wijesekera, H Wang, S Jajodia "VoIP Intrusion Detection Through Interacting Protocol State Machines" Dependable Systems and Networks, 2006. DSN 2006.
|
4 |
Biswanath Mukherjee, L Todd Heberlein, Karl Levitt, "Network Intrusion Detection", IEEE Network, Volume 8, Issue 3, pp. 26-41, May 1995.
|
5 |
Felix Lau, stuart H. Rubin, Michael H. Smith, Ljiljana Trajkovic, "Distributed Denial of Service Attacks", 2000 IEEE International Conference on Systems, Man and Cybernetics, Volume:, pp. 2275-2280, 3, 2000.
|
6 |
G Carl, G Kesidis, RR Brooks, S Rai, "Denial of service attack detection techniques", IEEE Internet Computing, pp. 82-89 January 2006.
|