V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time ,1999 View Artical
P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez, "Anomaly-Based Network Intrusion Detection: Techniques, Systems aand Challenges", Computers and Security ,Vol.28 ,2009 View Artical
K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim, "DDoS Attack Detection Method Using Cluster Analysis", Expert Systems with Applications ,2008 View Artical
A. Tajbakhsh, M. Rahmati, and A. Mirzaei, "Intrusion Detection Using Fuzzy Association Rules", Applied Soft Computing ,2009 View Artical
C. Yu, H. Kai, and K. Wei-Shinn, "Collaborative Detection of DDoS Attacks over Multiple Network Domains", IEEE Trans. Parallel and Distributed Systems ,Vol.18 ,2007 View Artical
J. Yu, H. Lee, M.-S. Kim, and D. Park, "Traffic Flooding Attack Detection with SNMP MIB Using SVM ,2008 View Artical
Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu, "Triangle- Area- Based Multivariate Correlation Analysis for Effective Denialof-Service Attack Detect", Proc. IEEE 11th Int?l Conf. Trust, Security and Pr ,2012 View Artical
G. Thatte, U. Mitra, and J. Heidemann, "Parametric Methods for Anomaly Detection in Aggregate Traffic", IEEE/ACM Trans. Networking ,Vol.19 ,2011 View Artical
S. Jin, et al, "Network Intrusion Detection in Covariance Feature Space ,Vol.40 ,2007 View Artical
J. Cheng, et al., "KDD Cup 2001 report ,2002 View Artical
M. Tavallaee, E. Bagheri, L. Wei, and A.A. Ghorbani, "A Detailed Analysis of the KDD Cup 99 Data Set ,2009 View Artical
A. Tajbakhsh, M. Rahmati, and A. Mirzaei, "Intrusion Detection Using Fuzzy Association Rules", Applied Soft Computing ,2009 View Artical
J. Cheng, et al., "KDD Cup 2001 report ,2002 View Artical