Implementation of anomaly detection algorithms for detecting Transmission Control Protocol Synchronized flooding attacks | IEEE Conference Publication | IEEE Xplore