Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Xiong, W., Hu, H., Xiong, N., Yang, L. T., Peng, W., Wang, X., & Qu, Y. Inf. Sci. (ISCI), 258:403-415, 2014. Paper bibtex @article{ dblp1952147,
title = {Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications},
author = {Wei Xiong and Hanping Hu and Naixue Xiong and Laurence T. Yang and Wen-Chih Peng and Xiaofei Wang and Yanzhen Qu},
author_short = {Xiong, W. and Hu, H. and Xiong, N. and Yang, L. T. and Peng, W. and Wang, X. and Qu, Y.},
bibtype = {article},
type = {article},
year = {2014},
key = {dblp1952147},
id = {dblp1952147},
biburl = {http://www.dblp.org/rec/bibtex/journals/isci/XiongHXYPWQ14},
url = {http://dx.doi.org/10.1016/j.ins.2013.04.009},
journal = {Inf. Sci. (ISCI)},
pages = {403-415},
volume = {258},
text = {Inf. Sci. (ISCI) 258:403-415 (2014)}
}
Downloads: 0
{"_id":{"_str":"5389a21a0e577e1d6b003154"},"__v":0,"authorIDs":[],"author_short":["Xiong, W.","Hu, H.","Xiong, N.","Yang, L. T.","Peng, W.","Wang, X.","Qu, Y."],"bibbaseid":"xiong-hu-xiong-yang-peng-wang-qu-anomalysecuredetectionmethodsbyanalyzingdynamiccharacteristicsofthenetworktrafficincloudcommunications-2014","bibdata":{"title":"Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications","author":["Wei Xiong","Hanping Hu","Naixue Xiong","Laurence T. Yang","Wen-Chih Peng","Xiaofei Wang","Yanzhen Qu"],"author_short":["Xiong, W.","Hu, H.","Xiong, N.","Yang, L. T.","Peng, W.","Wang, X.","Qu, Y."],"bibtype":"article","type":"article","year":"2014","key":"dblp1952147","id":"dblp1952147","biburl":"http://www.dblp.org/rec/bibtex/journals/isci/XiongHXYPWQ14","url":"http://dx.doi.org/10.1016/j.ins.2013.04.009","journal":"Inf. Sci. (ISCI)","pages":"403-415","volume":"258","text":"Inf. Sci. (ISCI) 258:403-415 (2014)","bibtex":"@article{ dblp1952147,\n title = {Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications},\n author = {Wei Xiong and Hanping Hu and Naixue Xiong and Laurence T. Yang and Wen-Chih Peng and Xiaofei Wang and Yanzhen Qu},\n author_short = {Xiong, W. and Hu, H. and Xiong, N. and Yang, L. T. and Peng, W. and Wang, X. and Qu, Y.},\n bibtype = {article},\n type = {article},\n year = {2014},\n key = {dblp1952147},\n id = {dblp1952147},\n biburl = {http://www.dblp.org/rec/bibtex/journals/isci/XiongHXYPWQ14},\n url = {http://dx.doi.org/10.1016/j.ins.2013.04.009},\n journal = {Inf. Sci. (ISCI)},\n pages = {403-415},\n volume = {258},\n text = {Inf. Sci. (ISCI) 258:403-415 (2014)}\n}","bibbaseid":"xiong-hu-xiong-yang-peng-wang-qu-anomalysecuredetectionmethodsbyanalyzingdynamiccharacteristicsofthenetworktrafficincloudcommunications-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1016/j.ins.2013.04.009"},"downloads":0},"bibtype":"article","biburl":"http://www.dblp.org/rec/bibtex/journals/isci/XiongHXYPWQ14","downloads":0,"keywords":[],"search_terms":["anomaly","secure","detection","methods","analyzing","dynamic","characteristics","network","traffic","cloud","communications","xiong","hu","xiong","yang","peng","wang","qu"],"title":"Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications","year":2014,"dataSources":["LShysQnrWKAggjqz6"]}