共 21 条
[1]
Zou L., Haas Z., Securing ad hoc networks, IEEE Network, pp. 24-30, (1999)
[2]
Zalenski R., Firewall technologies, IEEE Potentials, 21, pp. 24-29, (2002)
[3]
Buschkes R., Kesdogan D., Reichl P., How to increase security in mobile networks by anomaly detection, Proceedings of the 14th Annual IEEE Computer Security Applications Conference, pp. 3-12, (1998)
[4]
Lee W., Xiang D., Information-theoretic measures for anomaly detection, Proc. IEEE Symposium on Security and Privacy (S&P 2001), pp. 130-143, (2001)
[5]
Platt J., A resource-allocating network for function interpolation, Neural Computation, 3, pp. 213-225, (1991)
[6]
Chakrabarti A., Manimaran G., Internet infrastructure security: A taxonomy, IEEE Network, 16, 6, pp. 13-21, (2002)
[7]
Chang R.K.C., Defending against flooding-based distributed denial-of-service attacks: A tutorial, IEEE Communications Magazine, 40, 10, pp. 42-51, (2002)
[8]
Monin A.S., Weather Forecasting as a Problem in Physics, (1972)
[9]
Dutta M., Economics, Econometrics and the Links, (1995)
[10]
Kinsner W., Fractal and chaos engineering, Lecture Notes, (1994)