Attack rate

Known as: Attack ratio 
In epidemiology, the attack rate is the biostatistical measure of frequency of morbidity, or speed of spread, in an at risk population. It is used in… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1940-2017
0102019402016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
It is important to understand to what extent, and in what perspectives, cyber attacks can be predicted. Despite its evident… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
2014
2014
Distributed Denial of Service (DDoS) attack has become one of the major threats to the Internet. Traditional brute-force, high… (More)
  • figure 2
  • figure 4
  • figure 5
  • figure 7
  • figure 6
Is this relevant?
2013
2013
Rigorously characterizing the statistical properties of cyber attacks is an important problem. In this paper, we propose the… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Joseph T. Wu, Edward S. K. Ma, Cheuk Kwong Lee, Daniel K. W. Chu, Po-Lai Ho, Angela L. Shen, Andrew Ho, Ivan F. N. Hung, Steven… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
2008
2008
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2006
2006
1. Procedures for calculating the marginal attack rates and associatedk-values from observed death rates are presented for… (More)
  • figure 1
  • figure 2
Is this relevant?
2005
2005
The interaction between TCP and various active queue management (AQM) algorithms has been extensively analyzed for the last few… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2005
2005
In this paper, we propose a new scheme, called ANTID, for detecting and filtering DDoS attacks which use spoofed packets to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2002
2002
  • ELONGATA Esterly, A CARNIVOROUS, MARINE COPEPOD, John Yen
  • 2002
An accurate and precise measure of ingestion is important for understanding trophic interactions in the plankton. This paper… (More)
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Is this relevant?