共 19 条
[2]
[Anonymous], 2013, AFRICAN J COMPUT ICT
[5]
Modelling Web-server Flash Events
[J].
2012 11TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA),
2012,
:79-86
[6]
Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform
[J].
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS,
2009,
:710-713
[7]
Chengxu Ye, 2011, Proceedings of the 2011 International Conference on Computer Science and Network Technology (ICCSNT), P310, DOI 10.1109/ICCSNT.2011.6181964
[8]
A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds
[J].
ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURE INFORMATION TECHNOLOGY, VOL 2,
2016, 354
:17-23
[9]
Houssain K., 2002, P 27 ANN IEEE C LOC, P160
[10]
Jung J., 2002, WWW 02, P293, DOI DOI 10.1145/511446.511485