Carl et al., 2006
| Publication | Publication Date | Title |
|---|---|---|
| Carl et al. | Denial-of-service attack-detection techniques | |
| Jing et al. | Security data collection and data analytics in the internet: A survey | |
| Zou et al. | Monitoring and early warning for internet worms | |
| Dickerson et al. | Fuzzy intrusion detection | |
| Bhuyan et al. | An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection | |
| Gupta et al. | An ISP level solution to combat DDoS attacks using combined statistical based approach | |
| Dharma et al. | Time-based DDoS detection and mitigation for SDN controller | |
| Bhuyan et al. | E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric | |
| US20200195672A1 (en) | Analyzing user behavior patterns to detect compromised nodes in an enterprise network | |
| AU2013272211A1 (en) | Path scanning for the detection of anomalous subgraphs, anomaly/change detection and network situational awareness | |
| EP2901612A2 (en) | Apparatus, system and method for identifying and mitigating malicious network threats | |
| Mangrulkar et al. | Network attacks and their detection mechanisms: A review | |
| Hariri et al. | Quality-of-protection (QoP)-an online monitoring and self-protection mechanism | |
| Arshadi et al. | Entropy based SYN flooding detection | |
| Shan-Shan et al. | The APT detection method based on attack tree for SDN | |
| Kumar et al. | Statistical based intrusion detection framework using six sigma technique | |
| Ashoor et al. | Intrusion detection system (IDS) & intrusion prevention system (IPS): Case study | |
| Al-Mafrachi | Detection of DDoS attacks against the SDN controller using statistical approaches | |
| Yu et al. | On detecting camouflaging worm | |
| Bou-Harb et al. | On detecting and clustering distributed cyber scanning | |
| Sharma et al. | Leveraging machine learning and sdn-fog infrastructure to mitigate flood attacks | |
| Vijayarangan et al. | Detection of Denial of Service Attacks Using SNMP-MIB in Internet of Things Environment | |
| Gupta et al. | An efficient analytical solution to thwart DDoS attacks in public domain | |
| Ghosh et al. | Managing high volume data for network attack detection using real-time flow filtering | |
| Gomathi et al. | Identification of Network Intrusion in Network Security by Enabling Antidote Selection |