References
- Y. Hai, "Study on Distributed Denial of Service Attack Detection Model Based on PCA and GA-Artificial Neural Network", Lecture Notes in Electrical Engineering, Vol. 113, No. 2, pp. 1181-1188, Dec. 2011.
- A. -S. Jin, J. -Y. Choi, H. -I. Choi, "Automatic Attack Detection based on Improved ISODATA Algorithm", In Proc. of the Summer Conference of the Korea Society of Computer and Information, Vol. 18, No. 2, pp. 169-172, July 2010.
- C. -Y. Jeong, S. -G. Sohn, B.- H. Chang, and J. -C. Na, "An Efficient Method for Analyzing Network Security Situation Using Visualization", Journal of the Korean Institute of Information Security and Cryptology, Vol. 19, No. 3, pp. 107-117, June 2009.
- X. Yin, W. Yurcik, and A. Slagell, "The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness", In Proc. of the IEEE International Information Assurance Workshop, pp. 23-24, March 2005.
- J. McPherson, K. Ma, P. Krystosek, T. Bartoletti, and M. Christensen, "PortVis: A Tool for Port-Based Detection of Security Events", In Proc. of the ACM Workshop on Visualization and Data Mining for Computer Security, pp. 78-81, Oct. 2004.
- E. Corchado and A. Herrero, "Neural Visualization of Network Traffic Data for Intrusion Detection", Applied Soft Computing, Vol. 11, No. 2, pp. 2042-2056, March 2011. https://doi.org/10.1016/j.asoc.2010.07.002
- Y. D. Kim, "Performance of VoIP Traffics over MANETs under DDoS Intrusions", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 6, No. 4, pp. 493-498, Aug. 2011.
- Y. Xie and S. -Z. Yu, "Monitoring the Application-Layer DDoS Attacks for Popular Websites", IEEE/ACM Transactions on Networking, Vol. 17, No. 1, pp. 54-65, Feb. 2009. https://doi.org/10.1109/TNET.2008.923716
- T. Gamer, "Collaborative Anomaly-based Detection of Large-Scale Internet Attacks", Computer Networks, Vol. 56, No. 1, pp. 169-185, Jan. 2012. https://doi.org/10.1016/j.comnet.2011.08.015
- S. -W. Jang, G. -Y. Kim, and H. -S. Na, "Detecting Abnormal Patterns of Network Traffic by Analyzing Linear Patterns and Intensity Values", Journal of the Korea Society of Computer and Information, Vol. 17, No. 5, pp. 21-28, May 2012.
- D. -J. Choi, C. -K. Song, M. -G. Chun, and S. -W. Lee, "LED Inspection System of Post-Molding Process Using Image Processing", Journal of Korean Institute of Information Technology, Vol. 10, No. 5, pp. 17-27, May 2012.
- Q. Liu, Z. Zhao, Y. -X. Li, and Y. Li, "Feature Selection Based on Sensitivity Analysis of Fuzzy ISODATA", Neurocomputing, Vol. 85, pp. 29-37, May 2012. https://doi.org/10.1016/j.neucom.2012.01.005
- B. N. Subudhi, P. K. Nanda, and A. Ghosh, "Entropy-based Region Selection for Moving Object Detection", Pattern Recognition Letters, Vol. 32, No. 15, pp. 2097-2108, Nov. 2011. https://doi.org/10.1016/j.patrec.2011.07.028