-
2
-
-
0011967969
-
A nonparametric control chart for detecting small disorders
-
P. K. Bhattacharya and D. Frierson, "A nonparametric control chart for detecting small disorders," Ann. Statist., vol. 9, pp. 544-554, 1981.
-
(1981)
Ann. Statist
, vol.9
, pp. 544-554
-
-
Bhattacharya, P.K.1
Frierson, D.2
-
3
-
-
1642535783
-
A novel approach to detection of 'denial-of-service' attacks via adaptive sequential and batch-sequential change-point detection methods
-
West Point, NY
-
R. Blažek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of 'denial-of-service' attacks via adaptive sequential and batch-sequential change-point detection methods," in Proc. 2nd Annu. IEEE Syst., Man, Cybern. Inf. Assurance Workshop, West Point, NY, 2001.
-
(2001)
Proc. 2nd Annu. IEEE Syst., Man, Cybern. Inf. Assurance Workshop
-
-
Blažek, R.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
4
-
-
33947143139
-
The quickest sequential detection of intrusions in computer networks
-
Salt Lake City, UT, Mar. 12-15
-
_, "The quickest sequential detection of intrusions in computer networks," in Interface 2003, Salt Lake City, UT, Mar. 12-15, 2003.
-
(2003)
Interface 2003
-
-
Blažek, R.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
7
-
-
33947144882
-
-
Daemon9, Route, and Infinity, Project Neptune, Phrack Mag., 7, no. 48, 1996 [Online]. Available: http://www.phrack.org/show. php?p=48&a=13, File 13 of 18
-
Daemon9, Route, and Infinity, "Project Neptune," Phrack Mag., vol. 7, no. 48, 1996 [Online]. Available: http://www.phrack.org/show. php?p=48&a=13, File 13 of 18
-
-
-
-
8
-
-
33947145342
-
Adaptive procedures for detecting a change in distribution
-
V. P. Dragalin, "Adaptive procedures for detecting a change in distribution," in Proc. 4th Wuenburg-Umea Conf. Statist., 1996, pp. 87-103.
-
(1996)
Proc. 4th Wuenburg-Umea Conf. Statist
, pp. 87-103
-
-
Dragalin, V.P.1
-
9
-
-
0007781352
-
Fault detection in an ethernet network using anomaly signature matching
-
F. Feather and R. Maxon, "Fault detection in an ethernet network using anomaly signature matching," in ACM Sigcomm, 1993, vol. 23.
-
(1993)
ACM Sigcomm
, vol.23
-
-
Feather, F.1
Maxon, R.2
-
11
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
Washington, DC, Aug
-
T. M. Gil and M. Poletter, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. USENIX Security Symp. '01, Washington, DC, Aug. 2001, pp. 23-38.
-
(2001)
Proc. USENIX Security Symp. '01
, pp. 23-38
-
-
Gil, T.M.1
Poletter, M.2
-
12
-
-
21844483359
-
An efficient sequential nonparametric scheme for detecting a change in distribution
-
L. Gordon and M. Pollak, "An efficient sequential nonparametric scheme for detecting a change in distribution," Ann. Statist., vol. 22, pp. 763-804, 1994.
-
(1994)
Ann. Statist
, vol.22
, pp. 763-804
-
-
Gordon, L.1
Pollak, M.2
-
13
-
-
3543113439
-
A framework for classifying denial of service attacks
-
Karlsruhe, Germany
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. Sigcomm 2003, Karlsruhe, Germany, 2003.
-
(2003)
Proc. Sigcomm 2003
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
14
-
-
0034588633
-
On the trial of intrusions into information systems
-
December
-
S. Kent, "On the trial of intrusions into information systems," IEEE Spectrum, vol. 37, no. 12, pp. 52-56, December 2000.
-
(2000)
IEEE Spectrum
, vol.37
, Issue.12
, pp. 52-56
-
-
Kent, S.1
-
15
-
-
0001300222
-
Sequential changepoint detection in quality control and dynamical systems
-
T. L. Lai, "Sequential changepoint detection in quality control and dynamical systems," J. Roy. Statist. Soc. B, vol. 57, no. 4, pp. 613-658, 1995.
-
(1995)
J. Roy. Statist. Soc. B
, vol.57
, Issue.4
, pp. 613-658
-
-
Lai, T.L.1
-
16
-
-
0001524507
-
Procedures for reacting to a change in distribution
-
G. Lorden, "Procedures for reacting to a change in distribution," Ann. Math. Statist., vol. 42, pp. 1908-1987, 1971.
-
(1971)
Ann. Math. Statist
, vol.42
, pp. 1908-1987
-
-
Lorden, G.1
-
17
-
-
1242263196
-
Controlling high bandwidth aggregates in the network
-
Jul
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," ACM Comptit. Commun. Rev., Jul. 2001.
-
(2001)
ACM Comptit. Commun. Rev
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
18
-
-
0025496255
-
A Cusum procedure based on sequential ranks
-
D. McDonald, "A Cusum procedure based on sequential ranks," Naval Res. Logist., vol. 37, pp. 627-646, 1990.
-
(1990)
Naval Res. Logist
, vol.37
, pp. 627-646
-
-
McDonald, D.1
-
19
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France, Nov. 10-12
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proc. 10th IEEE Int. Conf. Newark Protocols (ICNP), Paris, France, Nov. 10-12, 2002, pp. 312-321.
-
(2002)
Proc. 10th IEEE Int. Conf. Newark Protocols (ICNP)
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
20
-
-
85084161486
-
Inferring Internet denial of service activity
-
Washington, DC
-
D. Moore, G. Voelker, and S. Savage, "Inferring Internet denial of service activity," in Proc. USENIX Security Symp., Washington, DC, 2001, pp. 9-22.
-
(2001)
Proc. USENIX Security Symp
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
21
-
-
0002916530
-
Continuous inspection schemes
-
E. S. Page, "Continuous inspection schemes," Biometrika, vol. 41, pp. 100-115, 1954.
-
(1954)
Biometrika
, vol.41
, pp. 100-115
-
-
Page, E.S.1
-
22
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
Washington, DC
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "COSSACK: Coordinated suppression of simultaneous attacks," in Proc. 3rd DARPA Information Survivability Conf. Exposition (Discex III), Washington, DC, 2003, vol. 1, pp. 2-13.
-
(2003)
Proc. 3rd DARPA Information Survivability Conf. Exposition (Discex III)
, vol.1
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
23
-
-
0033295259
-
Bro: A system for detecting network intruders in realtime
-
V. Paxson, "Bro: A system for detecting network intruders in realtime," Comput. Netw., vol. 31, no. 23-24, pp. 2435-2463, 1999.
-
(1999)
Comput. Netw
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
24
-
-
0000783098
-
Optimal detection of a change in distribution
-
M. Pollak, "Optimal detection of a change in distribution," Ann. Statist., vol. 13, pp. 206-227, 1985.
-
(1985)
Ann. Statist
, vol.13
, pp. 206-227
-
-
Pollak, M.1
-
25
-
-
0042662831
-
The expected sample size of some tests of power one
-
H. Robbins and D. Siegmund, "The expected sample size of some tests of power one," Ann. Statist., vol. 2, pp. 415-436, 1974.
-
(1974)
Ann. Statist
, vol.2
, pp. 415-436
-
-
Robbins, H.1
Siegmund, D.2
-
26
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proc. 13th Syst. Admin. Conf. (LISA), 1999, pp. 229-238.
-
(1999)
Proc. 13th Syst. Admin. Conf. (LISA)
, pp. 229-238
-
-
Roesch, M.1
-
27
-
-
0002196122
-
On optimum methods in quickest detection problems
-
A. N. Shiryaev, "On optimum methods in quickest detection problems," Theory Prob. Appl., vol. 8, pp. 22-16, 1963.
-
(1963)
Theory Prob. Appl
, vol.8
, pp. 22-16
-
-
Shiryaev, A.N.1
-
29
-
-
33746967507
-
Efficiency of the generalized Neyman-Pearson test for detecting changes in a multichannel system
-
_, "Efficiency of the generalized Neyman-Pearson test for detecting changes in a multichannel system," Prob. Inf. Transmission, vol. 28, pp. 341-350, 1992.
-
(1992)
Prob. Inf. Transmission
, vol.28
, pp. 341-350
-
-
Tartakovsky, A.G.1
-
30
-
-
33747018121
-
Comparison of some sequential rules for detecting changes in distributions
-
A. G. Tartakovsky and I. A. Ivanova, "Comparison of some sequential rules for detecting changes in distributions," Prob. Inf. Transmission, vol. 28, pp. 117-124, 1992.
-
(1992)
Prob. Inf. Transmission
, vol.28
, pp. 117-124
-
-
Tartakovsky, A.G.1
Ivanova, I.A.2
-
31
-
-
0346500982
-
Asymptotic properties of CUSUM and Shiryaev's procedures for detecting a change in a nonhomogeneous Gaussian process
-
A. G. Tartakovsky, "Asymptotic properties of CUSUM and Shiryaev's procedures for detecting a change in a nonhomogeneous Gaussian process," Math. Meth. Statist., vol. 4, no. 4, pp. 389-404, 1995.
-
(1995)
Math. Meth. Statist
, vol.4
, Issue.4
, pp. 389-404
-
-
Tartakovsky, A.G.1
-
32
-
-
33746983029
-
Detection of intrusions in information systems by sequential change-point methods
-
A. G. Tartakovsky, B. L. Rozovskii, R. Blazek, and H. Kim, "Detection of intrusions in information systems by sequential change-point methods," Statist. Methodol., vol. 3, no. 3, pp. 252-340, 2006.
-
(2006)
Statist. Methodol
, vol.3
, Issue.3
, pp. 252-340
-
-
Tartakovsky, A.G.1
Rozovskii, B.L.2
Blazek, R.3
Kim, H.4
-
33
-
-
33747009728
-
Change-point detection in multichannel and distributed systems with applications
-
N. Mukhopadhyay, S. Datta, and S. Chattopadhyay, Eds. New York: Marcel Dekker
-
A. G. Tartakovsky and V. Veeravalli, "Change-point detection in multichannel and distributed systems with applications," in Applications of Sequential Methodologies, N. Mukhopadhyay, S. Datta, and S. Chattopadhyay, Eds. New York: Marcel Dekker, 2004, pp. 339-370.
-
(2004)
Applications of Sequential Methodologies
, pp. 339-370
-
-
Tartakovsky, A.G.1
Veeravalli, V.2
-
34
-
-
27144525195
-
General asymptotic Bayesian theory of quickest change detection
-
_, "General asymptotic Bayesian theory of quickest change detection," Theory Prob. Appl., vol. 49, no. 3, pp. 458-497, 2005.
-
(2005)
Theory Prob. Appl
, vol.49
, Issue.3
, pp. 458-497
-
-
Tartakovsky, A.G.1
Veeravalli, V.2
-
35
-
-
0032643869
-
NOMAD: Traffic-based network monitoring framework for anomaly detection
-
R. R. Talpade, G. Kim, and S. Khurana, "NOMAD: Traffic-based network monitoring framework for anomaly detection," in Proc. 4th IEEE Symp. Comput. Commun., 1999, pp. 442-451.
-
(1999)
Proc. 4th IEEE Symp. Comput. Commun
, pp. 442-451
-
-
Talpade, R.R.1
Kim, G.2
Khurana, S.3
-
36
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Dallas, TX
-
V. A. Sins and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," in Proc. IEEE Global Telecommun. Conf. (IEEE GLOBECOM 2004), Dallas, TX, 2004, vol. 4, pp. 2050-2054.
-
(2004)
Proc. IEEE Global Telecommun. Conf. (IEEE GLOBECOM 2004)
, vol.4
, pp. 2050-2054
-
-
Sins, V.A.1
Papagalou, F.2
-
37
-
-
0036343692
-
Detecting SYN flooding attacks
-
New York
-
H. Wang, D. Zhang, and K. Shin, "Detecting SYN flooding attacks," in Proc. IEEE Infocom, New York, 2002, pp. 1530-1539.
-
(2002)
Proc. IEEE Infocom
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
38
-
-
0037333205
-
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
-
Mar
-
N. Ye, S. Vilbert, and Q. Chen, "Computer intrusion detection through EWMA for autocorrelated and uncorrelated data," IEEE Trans. Reliab., vol. 52, no. 1, pp. 75-82, Mar. 2003.
-
(2003)
IEEE Trans. Reliab
, vol.52
, Issue.1
, pp. 75-82
-
-
Ye, N.1
Vilbert, S.2
Chen, Q.3
|