메뉴 건너뛰기




Volumn 52, Issue , 2007, Pages 227-245

Graph sequence visualisation and its application to computer network monitoring and abnormal event detection

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34147194284     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-540-68020-8_9     Document Type: Article
Times cited : (5)

References (49)
  • 2
    • 0002603293 scopus 로고
    • Practical graph isomorphism
    • McKay, B.: Practical graph isomorphism, Congressus Numerantium, vol. 30, 1981, 45-87
    • (1981) Congressus Numerantium , vol.30 , pp. 45-87
    • McKay, B.1
  • 4
    • 51249191195 scopus 로고
    • A note on the derivation of maximal common subgraphs of two directed or undirected graphs
    • Levi, G.: A note on the derivation of maximal common subgraphs of two directed or undirected graphs. Calcolo, vol. 9, 1972, 341-354
    • (1972) Calcolo , vol.9 , pp. 341-354
    • Levi, G.1
  • 5
    • 0019909679 scopus 로고
    • Backtrack search algorithms and the maximal common subgraph problem
    • McGregor: Backtrack search algorithms and the maximal common subgraph problem, Software-Practice and Experience, vol. 12, 1982, 23-13
    • (1982) Software-Practice and Experience , vol.12 , pp. 23-13
    • McGregor1
  • 6
    • 0021022807 scopus 로고
    • Inexact graph matching for structural pattern recognition
    • Bunke, H. and Allermann, G.: Inexact graph matching for structural pattern recognition. Pattern Recognition Letters, vol. 1, 1983, 245-253
    • (1983) Pattern Recognition Letters , vol.1 , pp. 245-253
    • Bunke, H.1    Allermann, G.2
  • 7
    • 0020752197 scopus 로고
    • A distance measure between attributed relational graphs for pattern recognition
    • Sanfeliu, A. and Fu, K.: A distance measure between attributed relational graphs for pattern recognition. IEEE Transactions on Systems, Man and Cybernetics (Part B), vol. 13, no. 3, 1983, 353-363
    • (1983) IEEE Transactions on Systems, Man and Cybernetics (Part B , vol.13 , Issue.3 , pp. 353-363
    • Sanfeliu, A.1    Fu, K.2
  • 8
    • 0025431841 scopus 로고
    • An algorithm for graph optimal monomorphism
    • Wong, A.K., You, M. and Chan, A.C.: An algorithm for graph optimal monomorphism, IEEE Transactions on SMC vol. 20, 1990, 628-636
    • (1990) IEEE Transactions on SMC , vol.20 , pp. 628-636
    • Wong, A.K.1    You, M.2    Chan, A.C.3
  • 9
    • 4644303571 scopus 로고    scopus 로고
    • A (sub)graph isomorphism algorithm for matching large graphs
    • Cordelle, L., Foggia, P., Sansone, C. and Vento, M.: A (sub)graph isomorphism algorithm for matching large graphs, IEEE Transactions on PAMI vol. 26, 2004, 1367-1372
    • (2004) IEEE Transactions on PAMI , vol.26 , pp. 1367-1372
    • Cordelle, L.1    Foggia, P.2    Sansone, C.3    Vento, M.4
  • 10
    • 0032072467 scopus 로고    scopus 로고
    • A new algorithm for error-tolerant subgraph isomorphism detection
    • Messmer, B.T. and Bunke, H.: A new algorithm for error-tolerant subgraph isomorphism detection, IEEE Transactions on PAMI, vol. 20, 1998, 493-505
    • (1998) IEEE Transactions on PAMI , vol.20 , pp. 493-505
    • Messmer, B.T.1    Bunke, H.2
  • 14
    • 0031170384 scopus 로고    scopus 로고
    • Inexact graph matching using genetic search
    • Cross, A., Wilson, R. and Hancock, E.: Inexact graph matching using genetic search, Pattern Recognition, vol. 30, no. 6, 1997, 953-970
    • (1997) Pattern Recognition , vol.30 , Issue.6 , pp. 953-970
    • Cross, A.1    Wilson, R.2    Hancock, E.3
  • 16
    • 0032165969 scopus 로고    scopus 로고
    • A general framework for adaptive processing of data structures
    • Frasconi, P., Gori, M. and Sperduti, A.: A general framework for adaptive processing of data structures, IEEE Transactions on Neural Networks, vol. 9, no. 5, 1998, 768-786
    • (1998) IEEE Transactions on Neural Networks , vol.9 , Issue.5 , pp. 768-786
    • Frasconi, P.1    Gori, M.2    Sperduti, A.3
  • 17
    • 0036487278 scopus 로고    scopus 로고
    • Combining flat and structured representations for fingerprint classification with recursive neural networks and support vector machines
    • Yao, Y.,Marcialis, G., Pontil, M., Frasconi, P. and Roli, F.: Combining flat and structured representations for fingerprint classification with recursive neural networks and support vector machines, Pattern Recognition, vol. 36, no. 2, 2003, 397-406
    • (2003) Pattern Recognition , vol.36 , Issue.2 , pp. 397-406
    • Yao, Y.1    Marcialis, G.2    Pontil, M.3    Frasconi, P.4    Roli, F.5
  • 19
    • 0042199033 scopus 로고    scopus 로고
    • Spectral embedding of graphs
    • Luo, B., Wilson, R. and Hancock E.: Spectral embedding of graphs, Pattern Recogniction, vol. 36, no. 10, 2003, 2213-2223
    • (2003) Pattern Recogniction , vol.36 , Issue.10 , pp. 2213-2223
    • Luo, B.1    Wilson, R.2    Hancock, E.3
  • 22
    • 4444231365 scopus 로고    scopus 로고
    • A survey of kernels for structered data
    • Gärtner, T.: A survey of kernels for structered data, SIGKDD Explorations, vol. 5, no. 1, 2003, 49-58
    • (2003) SIGKDD Explorations , vol.5 , Issue.1 , pp. 49-58
    • Gärtner, T.1
  • 24
    • 33745360257 scopus 로고    scopus 로고
    • Edit distance based kernel functions for structural pattern classification
    • Neuhaus, M. and Bunke, H.: Edit distance based kernel functions for structural pattern classification, Pattern Recognition vol. 39, 2006, 1852-1863
    • (2006) Pattern Recognition , vol.39 , pp. 1852-1863
    • Neuhaus, M.1    Bunke, H.2
  • 25
    • 25144504620 scopus 로고    scopus 로고
    • Last, M, Kandel, A. and Bunke, H, Eds, World Scientific
    • Last, M., Kandel, A. and Bunke, H. (Eds.): Data mining in time series databases, World Scientific, 2004
    • (2004) Data mining in time series databases
  • 26
    • 11244259034 scopus 로고    scopus 로고
    • A wavelet-based framework for proactive detection of network misconfigurations
    • August
    • Magnaghi, A. and Hamada, T. and Katsuyama, T.: A wavelet-based framework for proactive detection of network misconfigurations. In SIGCOMM 2004, August 2004, 253-258
    • (2004) In SIGCOMM 2004 , pp. 253-258
    • Magnaghi, A.1    Hamada, T.2    Katsuyama, T.3
  • 28
    • 26944446508 scopus 로고    scopus 로고
    • Alarm clustering for intrusion detection systems in computer networks
    • Leipzig, Germany
    • Giacinto, G., Perdisci, R. and Roli, F.: Alarm clustering for intrusion detection systems in computer networks. In MLDM 2005: 4th International Conference, Leipzig, Germany, 2005, 184-193
    • (2005) MLDM 2005: 4th International Conference , pp. 184-193
    • Giacinto, G.1    Perdisci, R.2    Roli, F.3
  • 31
    • 0344704044 scopus 로고    scopus 로고
    • Graph based object tracking
    • Gomila, C. and Meyer, F.: Graph based object tracking, Proceedings of the ICIP 2003, vol. 3, 2003, 41-44
    • (2003) Proceedings of the ICIP , vol.3 , pp. 41-44
    • Gomila, C.1    Meyer, F.2
  • 32
    • 24644480236 scopus 로고    scopus 로고
    • A graph-based multi-resolution algorithm for tracking objects in presence of occlusions
    • Proceedings of the GbR
    • Conte, D., Foggia, P., Jolion, J.-M. and Vento, M.: A graph-based multi-resolution algorithm for tracking objects in presence of occlusions, Proceedings of the GbR 2005, Springer LNCS 3434, 2005, 193-202
    • (2005) Springer LNCS , vol.3434 , pp. 193-202
    • Conte, D.1    Foggia, P.2    Jolion, J.-M.3    Vento, M.4
  • 37
    • 34147222535 scopus 로고    scopus 로고
    • Kruegel, C. and Toth, T: Using decision trees to improve signature-based intrusion detection. RAID, 2003
    • Kruegel, C. and Toth, T: Using decision trees to improve signature-based intrusion detection. RAID, 2003
  • 38
    • 78149297786 scopus 로고    scopus 로고
    • Learning rules for anomaly detection of hostile network traffic
    • Washington, DC, USA, IEEE Computer Society
    • Mahoney, M. and Chan, P.: Learning rules for anomaly detection of hostile network traffic. In ICDM 2003: Third IEEE International Conference on Data Mining, 601-604, Washington, DC, USA, 2003. IEEE Computer Society
    • (2003) ICDM 2003: Third IEEE International Conference on Data Mining , pp. 601-604
    • Mahoney, M.1    Chan, P.2
  • 39
    • 0027188570 scopus 로고
    • A case based reasoning approach to the managment of faults in communications networks
    • San Francisco, CA, March
    • Lewis, L.: A case based reasoning approach to the managment of faults in communications networks. In IEEE INFOCOM, vol. 3, 1422-1429, San Francisco, CA, March 1993
    • (1993) IEEE INFOCOM , vol.3 , pp. 1422-1429
    • Lewis, L.1
  • 40
    • 26944492141 scopus 로고    scopus 로고
    • Signature-based approach for intrusion detection
    • Leipzig, Germany
    • Bon, K. S.: Signature-based approach for intrusion detection. In MLDM 2005: 4th International Conference, 526-536, Leipzig, Germany, 2005
    • (2005) MLDM 2005: 4th International Conference , pp. 526-536
    • Bon, K.S.1
  • 43
    • 0032154135 scopus 로고    scopus 로고
    • Proactive anomaly detection using distributed intelligent agents
    • September
    • Thottan, M. and Ji, C.: Proactive anomaly detection using distributed intelligent agents. IEEE Network, vol. 12, no. 5, September 1998, 21-27
    • (1998) IEEE Network , vol.12 , Issue.5 , pp. 21-27
    • Thottan, M.1    Ji, C.2
  • 47
    • 33746458432 scopus 로고    scopus 로고
    • Classification and detection of abnormal events in time series of graphs
    • Last M, Kandel, A. and Bunke, H, Eds, World Scientific
    • Bunke, H. and Kraetzl, M.: Classification and detection of abnormal events in time series of graphs. In: Last M., Kandel, A. and Bunke, H. (Eds.): Data Mining in Time Series Databases, World Scientific, 2004, 127-148
    • (2004) Data Mining in Time Series Databases , pp. 127-148
    • Bunke, H.1    Kraetzl, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.