h: 0px; "> [1] M. Manna and A. Amphawan “Review Of Syn-Flooding Attack Detection
Mechanism,” International Journal of Distributed and Parallel Systems
(IJDPS), Vol.3, No.1, January 2012.
[2] https://en.wikipedia.org/wiki/SYN_flood (Access date Dec. 3, 2017)
[3] B. AsSadhan, H. Kim, J. Moura, and X. Wang, “Network Traffic Behavior
Analysis by Decomposition into Control and Data Planes,"
InternationalWorkshop on Security in Systems and Networks (SSN) with
conjunction of IEEE International Parallel and Distributed Processing
Symposium (IPDPS), Miami, FL, USA, Apr. 18, 2008.
[4] http://en.wikipedia.org/wiki/Cross-correlation (Access date Dec.
3, 2017.
[5] A. Aibinu and J. Salami, A. Shafie , A. Najeeb “Comparing Autoregressive
Moving Average (ARMA) coefficients determination using Artificial
Neural Networks with other techniques” World Academy of Science,
Engineering and Technology, 18, 2008.
[6] http://en.wikipedia.org/wiki/Autoregressive_model (Access
date Dec. 3, 2017).