共 22 条
- [1] Ahmed A.A., Jantan A., Rasmi M., Service violation monitoring model for detecting and tracing bandwidth abuse, Journal of Network and Systems Management, 21, 2, pp. 218-237, (2013)
- [2] Ahmed A.A., Jantan A., Wan T.C., Sla-based complementary approach for network intrusion detection, Computer Communications, 34, 14, pp. 1738-1749, (2011)
- [3] Ahmed A.A., Jantan A., Wan T.C., Real-time detection of intrusive traffic in qos network domains, IEEE Security & Privacy, 11, 6, pp. 45-53, (2013)
- [4] Ahmed A.A., Jantan A., Wan T.C., Filtration model for the detection of malicious traffic in large-scale networks, Computer Communications, 82, 59-70, pp. 15-23, (2015)
- [5] Ahmed A.A., Sadiq A.S., Zolkipli M.F., Traceback model for identifying sources of distributed attacks in real time, Security and Communication Networks, (2016)
- [6] Chandran R., Yan W.Q., A comprehensive survey of antiforensics for network security, Managing Trust in Cyberspace, pp. 419-447, (2013)
- [7] Che T.W., Ma J.F., Li N., Wang C., A security quantitative analysis method for access control based on security entropy, International Journal of Network Security, 17, 5, pp. 517-521, (2015)
- [8] Gupta B.B., Joshi R.C., Misra M., Ann based scheme to predict number of zombies in a ddos attack, International Journal of Network Security, 14, 2, pp. 61-70, (2012)
- [9] Hwang M.S., Lee C.C., Research issues and challenges for multiple digital signatures, International Journal of Network Security, 1, 1, pp. 1-7, (2005)
- [10] Lee C.C., Hwang M.S., Liao I.E., On the security of self-certified public keys, International Journal of Information Security and Privacy, 5, 2, pp. 55-62, (2011)