-
1
-
-
0034588633
-
On the trail of intrusions into information systems
-
S. Kent On the trail of intrusions into information systems. IEEE Spectrum 37 12 2000 52 56
-
(2000)
IEEE Spectrum
, vol.37
, Issue.12
, pp. 52-56
-
-
Kent, S.1
-
3
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
vern@aciri.org
-
V. Paxson vern@aciri.org Bro: a system for detecting network intruders in real-time. IEEE Computer Networks 31 23-24 1999 2435 2463
-
(1999)
IEEE Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
7
-
-
14644397228
-
Change-point monitoring for the detection of DoS attacks
-
dzhang@qualcomm.com hnw@cs.wm.edu kgshin@eecs.umich.edu
-
H. Wang hnw@cs.wm.edu D. Zhang dzhang@qualcomm.com K. G. Shin kgshin@eecs.umich.edu Change-point monitoring for the detection of DoS attacks. IEEE Transactions on Dependable and Secure Computing 1 4 2004 193 208
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
13
-
-
0142200301
-
On the predictability of data network traffic
-
bohacek@eecis.udel.edu khushboo@usc.edu jonckhee@usc.edu Denver, Colo, USA
-
K. Shah khushboo@usc.edu S. Bohacek bohacek@eecis.udel.edu E. Jonckheere jonckhee@usc.edu On the predictability of data network traffic. Proceedings of the American Control Conference (ACC '03) 2 Denver, Colo, USA 2003 1619 1624
-
(2003)
Proceedings of the American Control Conference (ACC '03)
, vol.2
, pp. 1619-1624
-
-
Shah, K.1
Bohacek, S.2
Jonckheere, E.3
-
14
-
-
0032684826
-
Minimum message length and Kolmogorov complexity
-
csw@cs.monash.edu.au
-
C. S. Wallace csw@cs.monash.edu.au D. L. Dowe Minimum message length and Kolmogorov complexity. The Computer Journal 42 4 1999 270 283
-
(1999)
The Computer Journal
, vol.42
, Issue.4
, pp. 270-283
-
-
Wallace, C.S.1
Dowe, D.L.2
-
15
-
-
0022234944
-
Power spectrum reduction by optimal hankel norm approximation of the phase of the outer spectral factor
-
E. Jonckheere J. Helton Power spectrum reduction by optimal hankel norm approximation of the phase of the outer spectral factor. IEEE Transactions on Automatic Control 30 12 1985 1192 1201
-
(1985)
IEEE Transactions on Automatic Control
, vol.30
, Issue.12
, pp. 1192-1201
-
-
Jonckheere, E.1
Helton, J.2
-
16
-
-
77951203397
-
The complexity of finite objects and the development of the concepts of information and randomness by means of the theory of algorithms
-
A. Zvonkin L. Levin The complexity of finite objects and the development of the concepts of information and randomness by means of the theory of algorithms. Russian Mathematical Surveys 25 1970 6 83 124
-
(1970)
Russian Mathematical Surveys
, vol.25
, Issue.6
, pp. 83-124
-
-
Zvonkin, A.1
Levin, L.2
-
19
-
-
0016439532
-
Markovian representation of stochastic processes by canonical variables
-
H. Akaike Markovian representation of stochastic processes by canonical variables. SIAM Journal on Control 13 1 1975 162 173
-
(1975)
SIAM Journal on Control
, vol.13
, Issue.1
, pp. 162-173
-
-
Akaike, H.1
-
23
-
-
0004385984
-
Decay of correlations for the automorphism of the torus T2
-
F. Brini S. Siboni G. Turchetti S. Vaienti Decay of correlations for the automorphism of the torus T2. Nonlinearity 10 5 1997 1257 1268
-
(1997)
Nonlinearity
, vol.10
, Issue.5
, pp. 1257-1268
-
-
Brini, F.1
Siboni, S.2
Turchetti, G.3
Vaienti, S.4
-
26
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
M. E. Crovella A. Bestavros Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Transactions on Networking 5 6 1997 835 846
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
27
-
-
0032178081
-
Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic
-
Vancouver, BC, Canada
-
A. Feldmann A. C. Gilbert W. Willinger Data networks as cascades: investigating the multifractal nature of Internet WAN traffic. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '98) Vancouver, BC, Canada 1998 42 55
-
(1998)
Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '98)
, pp. 42-55
-
-
Feldmann, A.1
Gilbert, A.C.2
Willinger, W.3
-
29
-
-
33846206053
-
-
http://www.isi.edu/nsnam
-
-
-
-
40
-
-
1642535783
-
A novel approach to detection of denial-of service attacks via adaptive sequential and batch sequential change-point detection methods
-
New York, NY, USA
-
R. B. Blazek H. Kim B. Rozovskii A. Tartakovsky A novel approach to detection of denial-of service attacks via adaptive sequential and batch sequential change-point detection methods. Proceedings of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop New York, NY, USA 2001
-
(2001)
Proceedings of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
42
-
-
0035680331
-
Anomaly detection in communication networks using wavelets
-
V. Alarcon-Aquino J. A. Barria Anomaly detection in communication networks using wavelets. IEE Proceedings: Communications 148 6 2001 355 362
-
(2001)
IEE Proceedings: Communications
, vol.148
, Issue.6
, pp. 355-362
-
-
Alarcon-Aquino, V.1
Barria, J.A.2
-
46
-
-
1242287724
-
A framework for classifying denial of service attacks
-
Karlsruhe, Germany
-
A. Hussain J. Heidemann C. Papadopoulos A framework for classifying denial of service attacks. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03) Karlsruhe, Germany 2003 99 110
-
(2003)
Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03)
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
47
-
-
0036980251
-
Using signal processing to analyze wireless data traffic
-
Atlanta, Ga, USA
-
C. Partridge D. Cousins A. Jackson R. Krishnan T. Saxena W. T. Strayer Using signal processing to analyze wireless data traffic. Proceedings of the ACM Workshop on Wireless Security Atlanta, Ga, USA 2002
-
(2002)
Proceedings of the ACM Workshop on Wireless Security
-
-
Partridge, C.1
Cousins, D.2
Jackson, A.3
Krishnan, R.4
Saxena, T.5
Strayer, W.T.6
-
48
-
-
0042474246
-
Small-time scaling behaviors of Internet backbone traffic: An empirical study
-
San Francisco, Calif, USA
-
Z.-L. Zhang V. Ribeiro S. Moon C. Diot Small-time scaling behaviors of Internet backbone traffic: an empirical study. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03) 3 San Francisco, Calif, USA 2003 1826 1836
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03)
, vol.3
, pp. 1826-1836
-
-
Zhang, Z.-L.1
Ribeiro, V.2
Moon, S.3
Diot, C.4
-
54
-
-
0001579215
-
Identification and filtering of nonlinear systems using canonical variate analysis
-
SFI Studies in the Sciences of Complexity Addison
-
W. E. Larimore Identification and filtering of nonlinear systems using canonical variate analysis. Nonlinear Modeling and Forecasting SFI Studies in the Sciences of Complexity 12 Addison-Wesley Reading, Mass, USA 1991 283 303
-
(1991)
Nonlinear Modeling and Forecasting
, vol.12
, pp. 283-303
-
-
Larimore, W.E.1
-
56
-
-
0029231415
-
Heavy-tailed ON/OFF source behavior and self-similar traffic
-
Seattle, Wash, USA
-
P. Pruthi A. Erramilli Heavy-tailed ON/OFF source behavior and self-similar traffic. IEEE International Conference on Communications 1 Seattle, Wash, USA 1995 445 450
-
(1995)
IEEE International Conference on Communications
, vol.1
, pp. 445-450
-
-
Pruthi, P.1
Erramilli, A.2
|