X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (382) 382
Conference Proceeding (221) 221
Book Chapter (36) 36
Patent (34) 34
Web Resource (21) 21
Book / eBook (16) 16
Magazine Article (6) 6
Dissertation (2) 2
Reference (2) 2
Publication (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science, theory & methods (85) 85
computer science (70) 70
engineering, electrical & electronic (53) 53
internet (46) 46
computer science, information systems (43) 43
privacy (43) 43
computer science, hardware & architecture (42) 42
computer science, software engineering (36) 36
telecommunications (36) 36
algorithms (35) 35
security (34) 34
information technology (32) 32
analysis (30) 30
computer crime (28) 28
parallel processing (27) 27
servers (25) 25
computer communication networks (24) 24
network security (24) 24
networks (24) 24
protocols (23) 23
algorithm analysis and problem complexity (22) 22
australia (22) 22
differential privacy (22) 22
computer networks (21) 21
machine learning (21) 21
mathematical models (21) 21
software engineering (21) 21
processor architectures (20) 20
studies (20) 20
humans (19) 19
user interfaces and human computer interaction (18) 18
ip networks (17) 17
artificial intelligence (16) 16
computer-aided engineering and design (16) 16
computers (16) 16
correlation (16) 16
data privacy (16) 16
index medicus (16) 16
information systems applications (16) 16
mathematical model (16) 16
computational modeling (15) 15
congresses (15) 15
information systems (15) 15
mathematics (15) 15
research (15) 15
classification (14) 14
computer security (14) 14
computer software (14) 14
electronic mail (14) 14
fault tolerance (14) 14
propagation (14) 14
accuracy (13) 13
algorithm design and analysis (13) 13
computer architecture (13) 13
computer information security (13) 13
routing (13) 13
social network services (13) 13
social networks (13) 13
cloud computing (12) 12
ddos (12) 12
distributed computing (12) 12
distributed processing (12) 12
dynamics (12) 12
fixed constructions (12) 12
privacy preserving (12) 12
standards (12) 12
topology (12) 12
traffic classification (12) 12
traffic engineering (12) 12
traffic flow (12) 12
training (12) 12
data mining (11) 11
network topology (11) 11
peer to peer computing (11) 11
application software (10) 10
computer science, interdisciplinary applications (10) 10
cryptography (10) 10
delay (10) 10
information retrieval (10) 10
malware (10) 10
methods (10) 10
radiofrequency identification (10) 10
robustness (10) 10
telecommunication traffic (10) 10
testing (10) 10
usage (10) 10
analytical models (9) 9
authentication (9) 9
clustering algorithms (9) 9
computer simulation (9) 9
database management (9) 9
electronic books (9) 9
entropy (9) 9
filtering (9) 9
flexible materials not otherwise provided for (9) 9
gene expression (9) 9
information security (9) 9
laundering (9) 9
neural networks (9) 9
paper (9) 9
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


by An, Fengpeng and An, Guangpeng and An, Qi and Antonelli, Vito and Baussan, Eric and Beacom, John and Bezrukov, Leonid and Blyth, Simon and Brugnera, Riccardo and Avanzini, Margherita Buizza and Busto, Jose and Cabrera, Anatael and Cai, Hao and Cai, Xiao and Cammi, Antonio and Cao, Guofu and Cao, Jun and Chang, Yun and Chen, Shaomin and Chen, Shenjian and Chen, Yixue and Chiesa, Davide and Clemenza, Massimiliano and Clerbaux, Barbara and Conrad, Janet and D'Angelo, Davide and De Kerret, Hervé and Deng, Zhi and Deng, Ziyan and Ding, Yayun and Djurcic, Zelimir and Dornic, Damien and Dracos, Marcos and Drapier, Olivier and Dusini, Stefano and Dye, Stephen and Enqvist, Timo and Fan, Donghua and Fang, Jian and Favart, Laurent and Ford, Richard and Göger-Neff, Marianne and Gan, Haonan and Garfagnini, Alberto and Giammarchi, Marco and Gonchar, Maxim and Gong, Guanghua and Gong, Hui and Gonin, Michel and Grassi, Marco and Grewing, Christian and Guan, Mengyun and Guarino, Vic and Guo, Gang and Guo, Wanlei and Guo, Xin-Heng and Hagner, Caren and Han, Ran and He, Miao and Heng, Yuekun and Hsiung, Yee and Hu, Jun and Hu, Shouyang and Hu, Tao and Huang, Hanxiong and Huang, Xingtao and Huo, Lei and Ioannisian, Ara and Jeitler, Manfred and Ji, Xiangdong and Jiang, Xiaoshan and Jollet, Cécile and Kang, Li and Karagounis, Michael and Kazarian, Narine and Krumshteyn, Zinovy and Kruth, Andre and Kuusiniemi, Pasi and Lachenmaier, Tobias and Leitner, Rupert and Li, Chao and Li, Jiaxing and Li, Weidong and Li, Weiguo and Li, Xiaomei and Li, Xiaonan and Li, Yi and Li, Yufeng and Li, Zhi-Bing and Liang, Hao and Lin, Guey-Lin and Lin, Tao and Lin, Yen-Hsun and Ling, Jiajie and Lippi, Ivano and Liu, Dawei and Liu, Hongbang and Liu, Hu and Liu, Jianglai and Liu, Jianli and ... and Brookhaven National Lab. (BNL), Upton, NY (United States)
Journal of Physics G: Nuclear and Particle Physics, ISSN 0954-3899, 02/2016, Volume 43, Issue 3, pp. 30401 - 30588
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 08/2013, Volume 24, Issue 8, pp. 1633 - 1643
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 09/2009, Volume 13, Issue 9, pp. 717 - 719
Journal Article
IEEE Transactions on Vehicular Technology, ISSN 0018-9545, 05/2017, Volume 66, Issue 5, pp. 4410 - 4423
Journal Article
IEEE Transactions on Vehicular Technology, ISSN 0018-9545, 12/2016, Volume 65, Issue 12, pp. 9942 - 9953
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 06/2011, Volume 6, Issue 2, pp. 426 - 437
Journal Article
2005, Network Theory and Applications, ISBN 0387238395, Volume 15, xx, 513
This volume covers both theoretical and practical aspects of distributed computing. It describes the client-server model for developing distributed network... 
Distributed processing | Electronic data processing | Computer networks | Processor Architectures | Computer-Aided Engineering (CAD, CAE) and Design | Computer Science | User Interfaces and Human Computer Interaction
Book
IEEE/ACM Transactions on Networking, ISSN 1063-6692, 08/2015, Volume 23, Issue 4, pp. 1257 - 1270
As a fundamental tool for network management and security, traffic classification has attracted increasing attention in recent years. A significant challenge... 
Training | Correlation | Semi-supervised learning | Clustering algorithms | Ports (Computers) | zero-day applications | Robustness | IP networks | traffic classification | Payloads | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, THEORY & METHODS | TELECOMMUNICATIONS | IDENTIFICATION | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 09/2014, Volume 38, pp. 36 - 46
Web servers are usually located in a well-organized data center where these servers connect with the outside Internet directly through backbones. Meanwhile,... 
Backbone | DDoS attack | Model mining | ANOMALY DETECTION | COMPUTER SCIENCE, THEORY & METHODS | Denial of service attacks
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 07/2014, Volume 11, Issue 4, pp. 361 - 374
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2014, Volume 16, Issue 2, pp. 942 - 960
There are the two common means for propagating worms: scanning vulnerable computers in the network and spreading through topological neighbors. Modeling the... 
Computers | Analytical models | Network topology | Propagation | Network security | Electronic mail | Topology | IP networks | Grippers | Modeling | Worms | INTERNET | SIZE | DYNAMICS | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | SPREAD | Networks | Scanning | Spreading | Classification | Strategy | Spreads
Journal Article
Journal of Applied Polymer Science, ISSN 0021-8995, 05/2015, Volume 132, Issue 20, pp. np - n/a
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 01/2013, Volume 24, Issue 1, pp. 104 - 117
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 11/2018, Volume 15, Issue 6, pp. 1016 - 1026
Journal Article
IEEE Network, ISSN 0890-8044, 11/2015, Volume 29, Issue 6, pp. 83 - 87
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 06/2013, Volume 62, Issue 6, pp. 1193 - 1206
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 04/2008, Volume 12, Issue 4, pp. 318 - 321
DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic patterns to disable the detection algorithms which are based... 
Detectors | Telecommunication traffic | Packaging | Entropy | Communication system traffic control | Floods | Computer crime | Detection algorithms | Surges | Information theory | DDoS detection | Distribution distance | distribution distance | TELECOMMUNICATIONS | Denial of service attacks | Networks | Algorithms | Mathematical analysis | Pumps | Packages | Games | Flooding | Servers
Journal Article
IEEE Transactions on Knowledge and Data Engineering, ISSN 1041-4347, 08/2017, Volume 29, Issue 8, pp. 1619 - 1638
Journal Article