Author:
Chiu Shih-Ting,Susanto Heru,Leu Fang-Yie
Publisher
Springer International Publishing
Reference7 articles.
1. 5G security: IMT-2020(5G) promotion, China Academy of Information and Communications Technology. https://pdf.dfcfw.com/pdf/H3_AP202112141534538455_1.pdf?1639501401000.pdf
2. Virmani, D., Taneja, S., Chawla, T., Sharma, R., Kumar, R.: Entropy deviation method for analyzing network intrusion. In: International Conference on Computing, Communication and Automation (ICCCA), April 2016, pp. 515–519 (2016)
3. Sahoo, K.S., Sahoo, B., Vankayala, M., Dash, R.: Detection of control layer DDoS attack using entropy metrics in SDN: an empirical investigation. In: The Ninth International Conference on Advanced Computing (ICoAC), December 2017, pp. 281–286 (2017)
4. Daneshgadeh, S., Ahmed, T., Kemmerich, T., Baykal, N.: Detection of DDoS attacks and flash events using shannon entropy, KOAD and Mahalanobis distance. In: 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), February 2019, pp. 222–229 (2019)
5. Mamolar, A.S., Pervez, Z., Calero, J.M.A., Khattak, A.M.: Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks. In: Computers and Security, November 2018, vol.79, pp. 132–147 (2018)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献