Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications
- 1 February 2014
- journal article
- Published by Elsevier BV in Information Sciences
- Vol. 258, 403-415
- https://doi.org/10.1016/j.ins.2013.04.009
Abstract
No abstract availableThis publication has 30 references indexed in Scilit:
- Network prefix-level traffic profiling: Characterizing, modeling, and evaluationComputer Networks, 2010
- Profiling-By-AssociationPublished by Association for Computing Machinery (ACM) ,2010
- DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature AnalysisIEEE/ACM Transactions on Networking, 2010
- Understanding data center traffic characteristicsACM SIGCOMM Computer Communication Review, 2010
- Profiling and identification of P2P trafficComputer Networks, 2008
- A feasible intrusion detector for recognizing IIS attacks based on neural networksComputers & Security, 2008
- BLINCPublished by Association for Computing Machinery (ACM) ,2005
- Complex networks - Augmenting the framework for the study of complex systemsZeitschrift für Physik B Condensed Matter, 2004
- Phase objects in synchrotron radiation hard x-ray imagingJournal of Physics D: Applied Physics, 1996
- Traffic modeling for telecommunications networksIEEE Communications Magazine, 1994