01102 a2200217 4500003000500000005001700005040000900022082001000031100004100041245011200082260003900194300001500233505034900248538002900597650001400626651001100640942000800651999001900659952010300678952010300781Nust20170207153159.0 cNust a005.8 aIlyas, Muhammad Abu Baker (MSIS-1) aAnalysis and simulation of DOS attack detection using dependency and correlationcMuhammad Abu Baker Ilyas  bMCS (NUST)cApril 2007aRawalpindi axi, 91, p. aIntroduction (page-1) Anatomy of denial of service attacks (page-6) Survey of Major denial of service incidents (page-21) Detecting and mitigating denial of service attacks (page-33) Detecting sources of dos attacks (page-44) Proposed feature selection method (page-61) Implementation and results (page-70) Conclusion and future work (page-81). aAlmirah No 70 Shelf No 4 aPG Thesis aMSIS-1 cTHS c180882d180882 00102ddc40708NFICaMCSbMCSd2016-12-12l0o005.8 ILYpMCSTIS-21r2016-12-08w2016-12-12yBK 00102ddc40708NFICaMCSbMCSd2016-12-12l0o005.8 ILYpMCSTIS-71r2016-12-08w2016-12-12yBK