-
2
-
-
0001173444
-
Long-range dependence: Revisiting aggregation with wavelets
-
May
-
P. Abry, D. Veitch and P. Flandrin, Long-range dependence: Revisiting aggregation with wavelets, Journal of Time Series Analysis 19 (May 1998) 253-266.
-
(1998)
Journal of Time Series Analysis
, vol.19
, pp. 253-266
-
-
Abry, P.1
Veitch, D.2
Flandrin, P.3
-
3
-
-
0032090155
-
Generating representative Web workloads for network and server performance evaluation
-
P. Barford and M.E. Crovella, Generating representative Web workloads for network and server performance evaluation, in: ACM SigMetrics (1998) pp. 151-160.
-
(1998)
ACM SigMetrics
, pp. 151-160
-
-
Barford, P.1
Crovella, M.E.2
-
5
-
-
0041488497
-
-
8 April
-
CERT, Overview of attack trends, http://www.cert.org/archive/pdf/ attack_trends.pdf (8 April 2002).
-
(2002)
Overview of Attack Trends
-
-
-
7
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attack: A tutorial
-
R.K.C. Chang, Defending against flooding-based distributed denial-of-service attack: A tutorial, IEEE Communication Magazine 40(10) (2002) 42-51.
-
(2002)
IEEE Communication Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
8
-
-
0031383380
-
Self-similarity in World Wide Web traffic: Evidence and possible causes
-
M.E. Crovella and A. Bestavros, Self-similarity in World Wide Web traffic: Evidence and possible causes, IEEE/ACM Transactions on Networking 5(6) (1997) 835-846.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
9
-
-
0025482241
-
The wavelet transform, time-frequency localization and signal analysis
-
September
-
I. Daubechies, The wavelet transform, time-frequency localization and signal analysis, IEEE Transactions on Information Theory 36 (September 1990) 961-1005.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, pp. 961-1005
-
-
Daubechies, I.1
-
10
-
-
17444409457
-
Network ingress filtering: Defeating denial of service attacks which employ IP address spoofing
-
January
-
P. Ferguson and D. Senie, Network ingress filtering: Defeating denial of service attacks which employ IP address spoofing, Internet draft (January 1998).
-
(1998)
Internet Draft
-
-
Ferguson, P.1
Senie, D.2
-
11
-
-
0012292276
-
A neural network approach towards intrusion detection
-
Harris Corporation July
-
K. Fox, R. Henning, J. Reed and R. Simonian, A neural network approach towards intrusion detection, Technical Report, Harris Corporation (July 1990).
-
(1990)
Technical Report
-
-
Fox, K.1
Henning, R.2
Reed, J.3
Simonian, R.4
-
13
-
-
85013591309
-
On the self-similar nature of Ethernet traffic
-
W. Leland, M. Taqqu, W. Willinger and D. Wilson, On the self-similar nature of Ethernet traffic, Proc. of ACM SIGCOMM 23(4) (1993) 183-193.
-
(1993)
Proc. of ACM SIGCOMM
, vol.23
, Issue.4
, pp. 183-193
-
-
Leland, W.1
Taqqu, M.2
Willinger, W.3
Wilson, D.4
-
14
-
-
0028377540
-
On the self-similar nature of Ethernet traffic (extended version)
-
W. Leland, M. Taqqu, W. Willinger and D. Wilson, On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Transactions on Networking 2(1) (1994) 1-15.
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.1
, pp. 1-15
-
-
Leland, W.1
Taqqu, M.2
Willinger, W.3
Wilson, D.4
-
15
-
-
0035481772
-
Modeling heterogeneous network traffic in wavelet domain
-
S. Ma and C. Ji, Modeling heterogeneous network traffic in wavelet domain, IEEE/ACM Transactions on Networking 9(5) (2001) 634-649.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.5
, pp. 634-649
-
-
Ma, S.1
Ji, C.2
-
17
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
April
-
K. Park and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proc. of IEEE INFOCOM'01 (April 2001) pp. 338-347.
-
(2001)
Proc. of IEEE INFOCOM'01
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
18
-
-
0029323403
-
Wide area traffic: The failure of Poisson modeling
-
V. Paxson and S. Floyd, Wide area traffic: The failure of Poisson modeling, IEEE/ACM Transactions on Networking 3(3) (1995) 226-244.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
19
-
-
0032686283
-
A multifractal wavelet model with application to TCP network traffic
-
April
-
R. Riedi, M.S. Crouse, V. Ribeiro and R.G. Baraniuk, A multifractal wavelet model with application to TCP network traffic, Special Issue on Multiscale Statistical Signal a Nalysis and Its Applications of IEEE Transactions on Information Theory 45 (April 1999) 992-1018.
-
(1999)
Special Issue on Multiscale Statistical Signal A Nalysis and Its Applications of IEEE Transactions on Information Theory
, vol.45
, pp. 992-1018
-
-
Riedi, R.1
Crouse, M.S.2
Ribeiro, V.3
Baraniuk, R.G.4
-
20
-
-
23044527800
-
Contradictory relationship between Hurst parameter and queueing performance (extended version)
-
February
-
R. Ritke, X. Hong and M. Gerla, Contradictory relationship between Hurst parameter and queueing performance (extended version), Telecommunication Systems 16 (February 2001) 159-175.
-
(2001)
Telecommunication Systems
, vol.16
, pp. 159-175
-
-
Ritke, R.1
Hong, X.2
Gerla, M.3
-
21
-
-
0034239268
-
Real-time estimation of the parameters of long-range dependence
-
August
-
M. Roghan, D. Veitch and P. Abry, Real-time estimation of the parameters of long-range dependence, IEEE/ACM Transactions on Networking 8 (August 2000) 467-478.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, pp. 467-478
-
-
Roghan, M.1
Veitch, D.2
Abry, P.3
-
26
-
-
0036349135
-
A unified framework for understanding network traffic using independent wavelet models
-
June
-
X. Tian, J. Wu and C. Ji, A unified framework for understanding network traffic using independent wavelet models, in: Proc. of IEEE INFOCOM (June 2002).
-
(2002)
Proc. of IEEE INFOCOM
-
-
Tian, X.1
Wu, J.2
Ji, C.3
-
27
-
-
0141776045
-
A Markov chain model of temporal behavior for anomaly detection
-
June
-
N. Ye, A Markov chain model of temporal behavior for anomaly detection, in: Workshop on Information Assurance and Security (June 2000).
-
(2000)
Workshop on Information Assurance and Security
-
-
Ye, N.1
-
28
-
-
0042474246
-
Small-time scaling behaviors of Internet backbone traffic: An empirical study
-
April
-
Z. Zhang, V.J. Ribeiro, S. Moon and C. Diot, Small-time scaling behaviors of Internet backbone traffic: An empirical study, in: Proc. of IEEE INFOCOM (April 2003).
-
(2003)
Proc. of IEEE INFOCOM
-
-
Zhang, Z.1
Ribeiro, V.J.2
Moon, S.3
Diot, C.4
|