-
1
-
-
0033077324
-
The space complexity of approximating the frequency moments
-
N. Alon, Y. Matias, and M. Szegedy. The space complexity of approximating the frequency moments. Journal of Computer and System Sciences, 58(1):137-147, 1999.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.1
, pp. 137-147
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
3
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseille, France, November
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, Marseille, France, November 2002.
-
(2002)
Proceedings of the ACM SIGCOMM Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
7
-
-
0003410292
-
-
Prentice-Hall, Englewood Cliffs
-
G. E. P. Box, G. M. Jenkins, and G. C. Reinsel. Time Series Analysis, Forecasting and Control, Prentice-Hall, Englewood Cliffs, 1994.
-
(1994)
Time Series Analysis, Forecasting and Control
-
-
Box, G.E.P.1
Jenkins, G.M.2
Reinsel, G.C.3
-
9
-
-
33749580207
-
Aberrant behavior detection in time series for network monitoring
-
New Orleans, LA, December
-
J. Brutlag. Aberrant behavior detection in time series for network monitoring. In Proc. USENIX LISA XIV, New Orleans, LA, December 2000. http://www.usenix.org/events/lisa2000/full_papers/brutlag/brutlag_html/index. html.
-
(2000)
Proc. USENIX LISA XIV
-
-
Brutlag, J.1
-
11
-
-
84869158135
-
Finding frequent items in data streams
-
M. Charikar, K. Chen, and M. Farach-Colton. Finding frequent items in data streams. In Proc. of ICALP 2002, pages 693-703, 2002. http://www.cs.princeton.edu/~moses/papers/frequent.ps.
-
(2002)
Proc. of ICALP 2002
, pp. 693-703
-
-
Charikar, M.1
Chen, K.2
Farach-Colton, M.3
-
12
-
-
0003108131
-
Forecasting time series with outliers
-
C. Chen and L.-M. Liu. Forecasting time series with outliers. Journal of Forecasting, 12:13-35, 1993.
-
(1993)
Journal of Forecasting
, vol.12
, pp. 13-35
-
-
Chen, C.1
Liu, L.-M.2
-
13
-
-
21144473917
-
Joint estimation of model parameters and outlier effects in time series
-
C. Chen and L.-M. Liu. Joint estimation of model parameters and outlier effects in time series. Journal of the American Statistical Association, 88:284-297, 1993.
-
(1993)
Journal of the American Statistical Association
, vol.88
, pp. 284-297
-
-
Chen, C.1
Liu, L.-M.2
-
14
-
-
24644517133
-
What's hot and what's not: Tracking most frequent items dynamically
-
July
-
G. Cormode and S. Muthukrishnan. What's hot and what's not: Tracking most frequent items dynamically. In Proc. ACM PODC '2003, July 2003.
-
(2003)
Proc. ACM PODC '2003
-
-
Cormode, G.1
Muthukrishnan, S.2
-
15
-
-
14944363876
-
Estimating rarity and similarity over data stream windows
-
DIMACS Technical Report, November
-
M. Datar and S. Muthukrishnan. Estimating rarity and similarity over data stream windows. Technical Report 2001-21, DIMACS Technical Report, November 2001.
-
(2001)
Technical Report
, vol.2001
, Issue.21
-
-
Datar, M.1
Muthukrishnan, S.2
-
17
-
-
0141440878
-
New directions in traffic measurement and accounting
-
Pittsburgh, PA, August
-
C. Estan and G. Varghese. New directions in traffic measurement and accounting. In Proc. ACM SIGCOMM '2002, Pittsburgh, PA, August 2002.
-
(2002)
Proc. ACM SIGCOMM '2002
-
-
Estan, C.1
Varghese, G.2
-
18
-
-
84883986894
-
Fault detection in an ethernet network using anomaly signature matching
-
F. Feather, D. Siewiorek, and R. Maxion. Fault detection in an ethernet network using anomaly signature matching. In Proc. ACM SIGCOMM '93, 1993.
-
(1993)
Proc. ACM SIGCOMM '93
-
-
Feather, F.1
Siewiorek, D.2
Maxion, R.3
-
20
-
-
0012292276
-
A neural network approach towards intrusion detection
-
Technical Report, Harris Corporation, July
-
K. Fox, R. Henning, J. Reed, and R. Simonian. A neural network approach towards intrusion detection. Technical report, Technical Report, Harris Corporation, July 1990.
-
(1990)
Technical Report
-
-
Fox, K.1
Henning, R.2
Reed, J.3
Simonian, R.4
-
21
-
-
0004317693
-
Quicksand: Quick summary and analysis of network data
-
DIMACS Technical Report, November
-
A. C. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan, and M. J. Strauss. Quicksand: Quick summary and analysis of network data. Technical Report 2001-43, DIMACS Technical Report, November 2001.
-
(2001)
Technical Report
, vol.2001
, Issue.43
-
-
Gilbert, A.C.1
Guha, S.2
Indyk, P.3
Muthukrishnan, S.4
Strauss, M.J.5
-
22
-
-
0031351694
-
Proactive network fault detection
-
Kobe, Japan, April
-
C. Hood and C. Ji. Proactive network fault detection. In Proc. IEEE INFOCOM '97, Kobe, Japan, April 1997.
-
(1997)
Proc. IEEE INFOCOM '97
-
-
Hood, C.1
Ji, C.2
-
25
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
Honolulu, Hawaii, May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In Proceedings of the World Wide Web Conference, Honolulu, Hawaii, May 2002. http://www.research.att.com/~bala/papers/www02-fc.html.
-
(2002)
Proceedings of the World Wide Web Conference
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
26
-
-
0029516767
-
Schemes for fault identification in communication networks
-
December
-
I. Katzela and M. Schwartz. Schemes for fault identification in communication networks. IEEE/ACM Transactions on Networking, 3(6):753-764, December 1995.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.6
, pp. 753-764
-
-
Katzela, I.1
Schwartz, M.2
-
27
-
-
0037281711
-
Foreign policy behavior and fractional integration
-
February
-
M. J. Lebo and W. H. Moore. Foreign policy behavior and fractional integration. Journal of Conflict Resolution, 1(47):13-32, February 2003. http://garnet.acns.fsu.edu/~whmoore/research/Lebo&Moore2003.pdf.
-
(2003)
Journal of Conflict Resolution
, vol.1
, Issue.47
, pp. 13-32
-
-
Lebo, M.J.1
Moore, W.H.2
-
28
-
-
0242314805
-
The spread of the sapphire/slammer worm
-
Technical Report, February
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The Spread of the Sapphire/Slammer Worm. Technical report, Technical Report, February 2003. http://www.cs.berkeley.edu/~nweaver/sapphire/.
-
(2003)
Technical Report
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
29
-
-
85084161486
-
Inferring internet denial of service activity
-
Washington D.C., August
-
D. Moore, G. Voelker, and S. Savage. Inferring Internet Denial of Service Activity. In Proc. of the USENIX Security Symposium, Washington D.C., August 2001. http://www.cs.ucsd.edu/~savage/papers/UsenixSec01.pdf.
-
(2001)
Proc. of the USENIX Security Symposium
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
30
-
-
28444435635
-
Data streams: Algorithms and applications
-
Manuscript based on invited talk
-
S. Muthukrishnan. Data streams: Algorithms and applications, 2003. Manuscript based on invited talk from 14th SODA. Available from http://www.cs.rutgers.edu/~muthu/stream-l-l.ps.
-
(2003)
14th SODA
-
-
Muthukrishnan, S.1
-
31
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, December 1999. ftp://ftp.ee.lbl.gov/papers/bro-CN99.ps.gz.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
32
-
-
0003539116
-
Snort - Lightweight intrusion detection for networks
-
Seattle, WA, November
-
M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proc. USENIX Lisa '99, Seattle, WA, November 1999.
-
(1999)
Proc. USENIX Lisa '99
-
-
Roesch, M.1
-
34
-
-
77958468530
-
Supporting intrusion detection by graph clustering and graph drawing
-
Toulouse, France, October
-
J. Toelle and O. Niggemann. Supporting intrusion detection by graph clustering and graph drawing. In Proc. RAID '2000, Toulouse, France, October 2000.
-
(2000)
Proc. RAID '2000
-
-
Toelle, J.1
Niggemann, O.2
-
35
-
-
0000875323
-
Time series model specification in the presence of outliers
-
R. S. Tsay. Time series model specification in the presence of outliers. Journal of the American Statistical Association, 81:132-141, 1986.
-
(1986)
Journal of the American Statistical Association
, vol.81
, pp. 132-141
-
-
Tsay, R.S.1
-
36
-
-
84944452417
-
Outliers, level shifts, and variance changes in time series
-
R. S. Tsay. Outliers, level shifts, and variance changes in time series. Journal of Forecasting, 7:1-20, 1988.
-
(1988)
Journal of Forecasting
, vol.7
, pp. 1-20
-
-
Tsay, R.S.1
-
37
-
-
0018432155
-
A fast two-dimensional median filtering algorithm
-
February
-
T.S.Huang, G. J. Yang, and G. Y. Tang. A fast two-dimensional median filtering algorithm. IEEE transactions on acoustics, speech and signal processing, 27(1), February 1979.
-
(1979)
IEEE Transactions on Acoustics, Speech and Signal Processing
, vol.27
, Issue.1
-
-
Huang, T.S.1
Yang, G.J.2
Tang, G.Y.3
-
39
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, J.2
-
40
-
-
0141776045
-
A markov chain model of temporal behavior for anomaly detection
-
West Point, NY, June
-
N. Ye. A markov chain model of temporal behavior for anomaly detection. In Workshop on Information Assurance and Security, West Point, NY, June 2000.
-
(2000)
Workshop on Information Assurance and Security
-
-
Ye, N.1
|