Author of the publication

Early DoS/DDoS Detection Method using Short-term Statistics.

, , and . CISIS, page 168-173. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Token-based Code Clone Detection Technique in a Student's Programming Exercise., , and . BWCCA, page 650-655. IEEE, (2012)The Evaluation of an Anomaly Detection System Based on Chi-square Method., , and . AINA Workshops, page 708-713. IEEE Computer Society, (2012)Anomaly Detection Using Chi-square Values Based on the Typical Features and the Time Deviation., , and . AINA, page 97-104. IEEE Computer Society, (2011)Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis., , and . IIH-MSP, page 55-58. IEEE Computer Society, (2007)Early DoS/DDoS Detection Method using Short-term Statistics., , and . CISIS, page 168-173. IEEE Computer Society, (2010)Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance., , , and . BWCCA, page 497-502. IEEE Computer Society, (2014)Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method., , and . NBiS, page 221-228. IEEE Computer Society, (2011)An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm., , , and . BWCCA, page 549-554. IEEE Computer Society, (2011)DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number., , , and . IIH-MSP, page 206-209. IEEE Computer Society, (2009)A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise., , and . BWCCA, page 575-580. IEEE, (2013)