Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Seiichi OZAWA
Distributed Denial of Service (DDoS) Backscatter Detection System Using Resource Allocating Network With Data Selection
MEMOIRS OF THE GRADUATE SCHOOLS OF ENGINEERING AND SYSTEM INFORMATICS KOBE UNIVERSITY
Incremental Learning Algorithm for Feedforward Neural Network With Long-Term Memory
Transactions of the Society of Instrument and Control Engineers
Related publications
Distributed Denial of Service Detection Using Multi Layered Feed Forward Artificial Neural Network
International Journal of Computer Network and Information Security
Detection of Distributed Denial of Service Attacks Using Artificial Neural Networks
International Journal of Advanced Computer Science and Applications
Computer Science
A Review of Detection Approaches for Distributed Denial of Service Attacks
Systems Science and Control Engineering
Control
Systems Engineering
Optimization
Artificial Intelligence
A Distributed Denial of Service Testbed
IFIP Advances in Information and Communication Technology
Computer Networks
Information Systems
Management
Communications
Denial of Service Attack in Distributed Wireless Network by Distributed Jammer Network: A Birth-Death Random Process Analysis
Journal of Computer Science
Computer Networks
Software
Artificial Intelligence
Communications
Distributed Denial of Service Tools, Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht.
Anomaly Detection in Distributed Denial of Service Attack Using Map Reduce Improvised Counter Based Algorithm in Hadoop
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
Feature Selection for DDoS Detection Using Classification Machine Learning Techniques
IAES International Journal of Artificial Intelligence
Control
Systems Engineering
Information Systems
Electronic Engineering
Management
Electrical
Artificial Intelligence
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science