Citation to this article as recorded by
Chen, J.B., 2012. Implementation and evaluation of the live-CD based authentication gateway. Inform. Technol. J., 11: 1327-1331. CrossRefDirect Link |
Yan, R. and C. Shao, 2012. Hierarchical method for anomaly detection and attack identification in high-speed network. Inform. Technol. J., 11: 1243-1250. CrossRefDirect Link |
Citation to this article as recorded by
The contemporaneous epidemic of chronic, copper deficiency Journal of Nutritional Science |
Detection of cyber threats to network infrastructure of digital production based on the methods of Big Data and multifractal analysis of traffic SHS Web of Conferences |
Anomaly Detection Based on LRD Behavior Analysis of Decomposed
Control and Data Planes Network Traffic Using SOSS and FARIMA
Models IEEE Access |
Security analysis of cyber-physical systems network infrastructure 2018 IEEE Industrial Cyber-Physical Systems (ICPS) |
Detection of Anomalies in the Traffic of Information and Telecommunication Networks Based on the Assessment of its Self-Similarity 2020 International Russian Automation Conference (RusAutoCon) |
Nanomaterials as an alternative to increase plant resistance to abiotic stresses Frontiers in Plant Science |
Educational Organization’s Security Level Estimation Model Applied Sciences Vol. 11, Issue 17, 8061, 2021 |
An Approach to Detecting Cyber Attacks against Smart Power Grids Based on the Analysis of Network Traffic Self-Similarity Energies Vol. 13, Issue 19, 5031, 2020 |
Anti-Inflammatory and Analgesic Effects of Curcumin Nanoparticles Associated with Diclofenac Sodium in Experimental Acute Inflammation International Journal of Molecular Sciences Vol. 23, Issue 19, 11737, 2022 |
A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods Sensors Vol. 22, Issue 19, 7506, 2022 |
Crushed Glass and Oil Extracted from Palm Oil Sludge as Primary Materials in the Production of Hydrophobic Sand for Capillary Barrier Applications Sustainability Vol. 14, Issue 19, 12770, 2022 |
Zoonoses Transfer, Factory Farms and Unsustainable Human–Animal Relations Sustainability Vol. 14, Issue 19, 12806, 2022 |
How to cite this article
Ruoyu Yan and Yingfeng Wang, 2012. Hurst Parameter for Security Evaluation of LAN Traffic. Information Technology Journal, 11: 269-275.
DOI: 10.3923/itj.2012.269.275
URL: https://scialert.net/abstract/?doi=itj.2012.269.275
DOI: 10.3923/itj.2012.269.275
URL: https://scialert.net/abstract/?doi=itj.2012.269.275