GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Wiley  (2)
  • Sun, Qibo  (2)
Material
Publisher
  • Wiley  (2)
Person/Organisation
Language
Years
  • 1
    Online Resource
    Online Resource
    Wiley ; 2012
    In:  Security and Communication Networks Vol. 5, No. 10 ( 2012-10), p. 1112-1120
    In: Security and Communication Networks, Wiley, Vol. 5, No. 10 ( 2012-10), p. 1112-1120
    Abstract: Trusted quality of Web service (QoWS) issue is critical for e‐commerce applications. However, many existing studies have little work in situations that have insufficient or no historical information regarding QoWS data. In this study, we propose a trusted QoWS metric approach, that is, Bayesian Approach with Maximum Entropy Principle. The key of our proposed approach is to extract QoWS prior distribution of Web service by using Maximum Entropy Principle and then to infer QoWS posterior distribution of Web service by using Bayesian Approach. On the basis of the obtained QoWS posterior distribution, trusted QoWS can be measured. We conduct extensive simulations to evaluate our proposed approach. The simulation results demonstrate that our proposed approach can obtain trusted QoWS effectively. Copyright © 2012 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2012
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Wiley ; 2012
    In:  Security and Communication Networks Vol. 5, No. 10 ( 2012-10), p. 1131-1140
    In: Security and Communication Networks, Wiley, Vol. 5, No. 10 ( 2012-10), p. 1131-1140
    Abstract: SYN flooding attacks are a common type of distributed denial‐of‐service attacks. Up to now, many defense schemes have been proposed against SYN flooding attacks. Traditional defense schemes rely on passively sniffing an attacking signature and are inaccurate in the early stages of an attack. These schemes are effective only at the later stages when attacking signatures are obvious. In this paper, we propose a detection approach that makes use of SYN traffic prediction to determine whether SYN flooding attacks happen at the early stage. We firstly adopt grey prediction model to predict SYN traffic, and then, we employ cumulative sum algorithm to detect SYN flooding attack traffic among forecasted SYN traffic. Trace‐driven simulation results demonstrate that our proposed detection approach can detect SYN flooding attacks effectively. Copyright © 2012 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2012
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...