Browse/Search Results: 1-5 of 5

Selected(0)Clear Items/Page:    Sort:
Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing Journal article
Computer Communications,2020, volume: 161, pages: 375-386
Authors:  Liu, Yuxin;  Wang, Tian;  Zhang, Shaobo;  Liu, Xuxun;  Liu, Xiao
Favorite  |  View/Download:3/0  |  Submit date:2021/12/02
A novel botnet detection method based on preprocessing data packet by graph structure clustering Conference paper
Proceedings - 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2016, Chengdu, CHINA, OCT 13-15, 2016
Authors:  Kong, Xinling;  Chen, Yonghong;  Tian, Hui;  Wang, Tian;  Cai, Yiqiao
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
A blind detection method for tracing the real source of DDoS attack packets by cluster matching Conference paper
Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016, Beijing, CHINA, JUN 04-06, 2016
Authors:  Chen, Yonghong;  Chen, Xin;  Tian, Hui;  Wang, Tian;  Cai, Yiqiao
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
A blind detection model for tracing back a single-packet from mixed traffic by determining parameters of features' windows Journal article
Journal of Information and Computational Science,2015, volume: 12, issue: 16, pages: 6209-6218
Authors:  Chen, Xin;  Chen, Yonghong;  Tian, Hui;  Wang, Tian;  Cai, Yiqiao
Favorite  |  View/Download:1/0  |  Submit date:2021/12/02
Traceback of DDoS attacks using entropy variations Journal article
IEEE Transactions on Parallel and Distributed Systems,2012, volume: 23, issue: 3, pages: 412-425
Authors:  Yu, Shui;  Zhou, Wanlei;  Doss, Robin;  Jia, Weijia
Favorite  |  View/Download:3/0  |  Submit date:2021/05/10