A Resource Consumption Attack Identification Method Based on Data Fusion

Author(s):  
Libin Jiao ◽  
Yonghua Huo ◽  
Ningling Ge ◽  
Zhongdi Ge ◽  
Yang Yang
1995 ◽  
Vol 6 (1) ◽  
pp. 227-236 ◽  
Author(s):  
X. E. Gros ◽  
P. Strachan ◽  
D. W. Lowden
Keyword(s):  

1999 ◽  
Author(s):  
Daniel M. Davenport ◽  
Keyword(s):  

2004 ◽  
Author(s):  
Geoffrey B. Duggan ◽  
Simon Banbury ◽  
Andrew Howes ◽  
John Patrick ◽  
Samuel M. Waldron

2007 ◽  
Author(s):  
Heather Barnes Truelove ◽  
Jeff Joireman ◽  
Donelle C. Posey ◽  
Adrian Spencer ◽  
Nicole Hoffer

ICCTP 2011 ◽  
2011 ◽  
Author(s):  
Xing-jian Zhang ◽  
Xiao-hua Zhao ◽  
Jian Rong ◽  
Shi-li Xu

2012 ◽  
Vol 132 (2) ◽  
pp. 231-237
Author(s):  
Yuuki Imanara ◽  
Kota Itakura ◽  
Masaki Samejima ◽  
Masanori Akiyoshi

Sign in / Sign up

Export Citation Format

Share Document