Open Access
Issue |
E3S Web Conf.
Volume 184, 2020
2nd International Conference on Design and Manufacturing Aspects for Sustainable Energy (ICMED 2020)
|
|
---|---|---|
Article Number | 01052 | |
Number of page(s) | 6 | |
DOI | https://doi.org/10.1051/e3sconf/202018401052 | |
Published online | 19 August 2020 |
- M. Alkasassbeh, G. Al-Naymat et.al,” Detecting Distributed Denial of Service Attacks Using Data Mining Technique,” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, pp. 436-445, 2016. Science and Information Technologies, Vol. 6 (2), pp. 1096-1099, 2015. [Google Scholar]
- Hoda Waguih, “A Data Mining Approach for the Detection of Denial of Service Attack”, International Journal of Artificial Intelligence, Vol. 2 pp. 99106(2013). [Google Scholar]
- Dewan Md. Farid, Nouria Harbi, EmnaBahri, Mohammad Zahid ur Rahman, Chowdhury Mofizur Rahman,‟ Attacks Classification in Adaptive Intrusion Detection using Decision Tree “International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol:4, No:3, 2010. [Google Scholar]
- Kiri Wagsta,ClaireCardie ,Seth Rogers ,Stefan Schroedl,‟ Constrained K-means Clustering with Background Knowledge‟ Proceedings of the Eighteenth International Conference on Machine Learning, 2001, p. 577-584. [Google Scholar]
- Singh, S.K., Gupta, A.K. Application of support vector regression in predicting thickness strains in hydro-mechanical deep drawing and comparison with ANN and FEM (2010) CIRP Journal of Manufacturing Science and Technology, 3 (1), pp. 66-72 [Google Scholar]
- Ramesh.G, Madhavi, K. “Summarizing Product Reviews using NLP based Text Summarization”, International Journal of Scientific & Technology Research, September 2019. (Scopus). [Google Scholar]
- Mangesh Salunke, Ruhi Kabra, Ashish Kumar.‟ Layered architecture for DoS attack detection system by combine approach of Naive Bayes and Improved Kmeans Clustering Algorithm‟, International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 03, June-2015. [Google Scholar]
- Ramesh G, Madhavi K., “Best keyword set recommendations for building service-based systems” International Journal of Scientific and Technology Research, October, 2019. [Google Scholar]
- T. Subbulakshmi et.al, ‟A Unified Approach for Detection and Prevention of DDoS Attacks Using Enhanced Support Vector Machine and Filtering Mechanisms‟, ICTACT Journal on Communication Technology, June 2013. [Google Scholar]
- Yogeswara Reddy B, Srinivas Rao J, Suresh Kumar T, Nagarjuna A, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, No. 11, 2019, pp: 1194-1198. [Google Scholar]
- T. Subbulakshmi, K. BalaKrishnan; S.M. Shalinie ; D. Anand Kumar ; V. Ganapathi Subramanian ; K. Kannathal.‟Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset‟, ICTACT Journal on Communication Technology, Volume: 04, Issue: 02, June 2013. [Google Scholar]
- Kanagalakshmi.R, V. Naveenantony Raj,‟ Network Intrusion Detection Using Hidden Naïve Bayes Multiclass Classifier Model,‟ International Journal of Science, Technology & Management ,Volume No.03, Issue No. 12, December 2014. [Google Scholar]
- A. Bivens, C. Palagiri, R. Smith, B. Szymanski, M. Embrechts, et al, “Network-based intrusion detection using neural networks,” Intelligent Engineering Systems through Artificial Neural Networks, Vol. 12, no. 1, pp. 579-584, 2002. [Google Scholar]
- Jasreena Kaur Bains,Kiran Kumar Kaki,Kapil Sharma,‟ Intrusion Detection System with Multi-Layer using Bayesian Networks‟, International Journal of Computer Applications (0975 - 8887) Volume 67- No.5, April 2013 [Google Scholar]
- Jasreena Kaur Bains,Kiran Kumar Kaki,Kapil Sharma,‟ Intrusion Detection System with Multi-Layer using Bayesian Networks‟, International Journal of Computer Applications (0975 - 8887) Volume 67- No.5, April 2013. [Google Scholar]
- Ch Mallikarjuna Rao, G. Ramesh, Madhavi, K, “Feature Selection Based Supervised Learning Method for Network Intrusion Detection”, International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue-1, May 2019. [Google Scholar]
- R Vijayasarathy, Balaraman Ravindran,S.V Raghavan,‟A System Approach to Network Modeling for DDoS Detection using a Naive Bayesian Classifier,‟ Department of Computer Science and Engineering IIT Madras, India. [Google Scholar]
- V. Hema and C. EmilinShyni, ‟ DoS Attack Detection Based on Naive Bayes Classifier, ‟ Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 398-405, 2015. [Google Scholar]
- Afrah Nazir, “ A Comparative Study of different Artificial Neural Networks based Intrusion Detection Systems” International Journal of Scientific and Research Publications, Volume 3, Issue 7, July 2013. [Google Scholar]
- Samaneh Rastegari, M. Iqbal Saripan and MohdFadlee A. Rasid,‟ Detection of Denial of Service Attacks against Domain Name System Using Neural Networks‟, IJCSI International Journal of Computer Science Issues, Vol. 6, No. 1, 2009. [Google Scholar]
- Madhav Kale and D.M. Choudhari, ‟ DDOS Attack Detection Based on an Ensemble of Neural Classifier, ‟ IJCSNS International Journal of Computer Science and Network Security, VOL. 14 No.7, July 2014. [Google Scholar]
- Mohammed Salem, Helen Armstrong,‟ Identifying DOS Attacks Using Data Pattern Analysis,‟ Australian Information Security Management Conference Security Research Institute Conferences,2008. [Google Scholar]
- Mohammad Masoud Javidi, Mohammad Hassan Nattaj, ‟ Journal of mathematics and computer Science 6 (2013), 85-96. [CrossRef] [Google Scholar]
- Thirupathi, N, Madhavi K, Ramesh G., Sowmya Priya, K. “Data Storage in Cloud Using Key-Policy Attribute-Based Temporary Keyword Search Scheme” (KP-ABTKS), Lecture Notes in Networks and Systems, 2020. [Google Scholar]
- Madhavi.K., G. Ramesh, G. Lavanya “Load effectiveness on coverage-technique for test case prioritization in regression testing”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-7 May, 2019. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.