Author of the publication

ML: DDoS Damage Control with MPLS.

, , , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 101-116. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information., and . RAID, volume 3224 of Lecture Notes in Computer Science, page 166-187. Springer, (2004)Time series modeling for IDS alert management., , , and . AsiaCCS, page 102-113. ACM, (2006)A Service Dependency Modeling Framework for Policy-Based Response Enforcement., , , , and . DIMVA, volume 5587 of Lecture Notes in Computer Science, page 176-195. Springer, (2009)Security information management as an outsourced service., and . Inf. Manag. Comput. Secur., 14 (5): 417-435 (2006)ML: DDoS Damage Control with MPLS., , , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 101-116. (2016)Processing intrusion detection alert aggregates with time series modeling., , , , and . Inf. Fusion, 10 (4): 312-324 (2009)Machine Learning for QUIC Traffic Flood Detection., , , and . GIIS, page 1-6. IEEE, (2024)Intrusion Detection: Introduction to Intrusion Detection and Security Information Management., and . FOSAD, volume 3655 of Lecture Notes in Computer Science, page 207-236. Springer, (2005)Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol., , , and . ICC Workshops, page 1259-1264. IEEE, (2023)