[1]
|
DDoS Attack Detection Through Digital Twin Technique in Metaverse
2023 IEEE International Conference on Consumer Electronics (ICCE),
2023
DOI:10.1109/ICCE56470.2023.10043433
|
|
|
[2]
|
Cyber Security, Privacy and Networking
Lecture Notes in Networks and Systems,
2022
DOI:10.1007/978-981-16-8664-1_16
|
|
|
[3]
|
Detection of DDOS Attack Using IDS Mechanism: A Review
2022 1st International Conference on Informatics (ICI),
2022
DOI:10.1109/ICI53355.2022.9786899
|
|
|
[4]
|
A Comparative Analysis of Machine Learning-Based Website Phishing Detection Using URL Information
2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI),
2022
DOI:10.1109/PRAI55851.2022.9904055
|
|
|
[5]
|
Big Data Analytics for Internet of Things
2021
DOI:10.1002/9781119740780.ch13
|
|
|
[6]
|
Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3062909
|
|
|
[7]
|
Big Data Analytics for Internet of Things
2021
DOI:10.1002/9781119740780.ch13
|
|
|
[8]
|
A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment
2021 IEEE 10th Global Conference on Consumer Electronics (GCCE),
2021
DOI:10.1109/GCCE53005.2021.9622091
|
|
|
[9]
|
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
International Journal of E-Services and Mobile Applications,
2020
DOI:10.4018/IJESMA.2020070104
|
|
|
[10]
|
Handbook of Research on Intrusion Detection Systems
Advances in Information Security, Privacy, and Ethics,
2020
DOI:10.4018/978-1-7998-2242-4.ch010
|
|
|
[11]
|
Cloud Security
2019
DOI:10.4018/978-1-5225-8176-5.ch031
|
|
|
[12]
|
Innovations in Computer Science and Engineering
Lecture Notes in Networks and Systems,
2019
DOI:10.1007/978-981-10-8201-6_1
|
|
|
[13]
|
The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy
2018 International Conference on High Performance Computing & Simulation (HPCS),
2018
DOI:10.1109/HPCS.2018.00111
|
|
|
[14]
|
Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy
Wireless Personal Communications,
2017
DOI:10.1007/s11277-017-3953-5
|
|
|
[15]
|
Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks
2017 25th International Conference on Systems Engineering (ICSEng),
2017
DOI:10.1109/ICSEng.2017.31
|
|
|
[16]
|
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Security and Communication Networks,
2017
DOI:10.1155/2017/9150965
|
|
|
[17]
|
Graphics processing unit based next generation DDoS prevention system
2016 4th International Symposium on Digital Forensic and Security (ISDFS),
2016
DOI:10.1109/ISDFS.2016.7473518
|
|
|
[18]
|
A survey of cloud-based network intrusion detection analysis
Human-centric Computing and Information Sciences,
2016
DOI:10.1186/s13673-016-0076-z
|
|
|
[19]
|
HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster-Shafer theory with MapReduce
Security and Communication Networks,
2016
DOI:10.1002/sec.1611
|
|
|
[20]
|
Recent survey of various defense mechanisms against phishing attacks
Journal of Information Privacy and Security,
2016
DOI:10.1080/15536548.2016.1139423
|
|
|
[21]
|
HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
Security and Communication Networks,
2016
DOI:10.1002/sec.1611
|
|
|
[22]
|
DDoS detection and filtering technique in cloud environment using GARCH model
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE),
2015
DOI:10.1109/GCCE.2015.7398603
|
|
|
[23]
|
Achieving Enterprise Agility through Innovative Software Development
Advances in Systems Analysis, Software Engineering, and High Performance Computing,
2015
DOI:10.4018/978-1-4666-8510-9.ch013
|
|
|
[24]
|
Defence for Distributed Denial of Service Attacks in Cloud Computing
Procedia Computer Science,
2015
DOI:10.1016/j.procs.2015.12.037
|
|
|
[25]
|
Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach
2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT),
2014
DOI:10.1109/ICCICCT.2014.6992947
|
|
|
[26]
|
Defense against DoS attack: PSO approach in virtualization
2014 Sixth International Conference on Advanced Computing (ICoAC),
2014
DOI:10.1109/ICoAC.2014.7229709
|
|
|