-
3
-
-
33845761159
-
Data cleansing and preparation at the gates: A data-streaming perspective
-
August
-
D. Faxon, R. D. King, J. T. Rigsby, S. Bernard, and E. J. Wegman. Data cleansing and preparation at the gates: A data-streaming perspective. In 2004 Proceedings of the American Statistical Association, August 2004.
-
(2004)
2004 Proceedings of the American Statistical Association
-
-
Faxon, D.1
King, R.D.2
Rigsby, J.T.3
Bernard, S.4
Wegman, E.J.5
-
4
-
-
20444505708
-
Scatter (and other) plots for visualizing user profiling data and network traffic
-
New York, NY, USA, ACM Press
-
T. Goldring. Scatter (and other) plots for visualizing user profiling data and network traffic. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 119-123, New York, NY, USA, 2004. ACM Press.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 119-123
-
-
Goldring, T.1
-
8
-
-
84996245049
-
Visualizing and diacovering non-trivial patterns in large time series databases
-
April
-
J. Lin, E. Keogh, and S. Lonard. Visualizing and diacovering non-trivial patterns in large time series databases. Information Visualization Journal, 4(2):61-82, April 2005.
-
(2005)
Information Visualization Journal
, vol.4
, Issue.2
, pp. 61-82
-
-
Lin, J.1
Keogh, E.2
Lonard, S.3
-
11
-
-
14344265818
-
Internet traffic classification using Bayesian analysis techniques
-
June
-
A. Moore and D. Zuev. Internet traffic classification using Bayesian analysis techniques. In Proceedings of the ACM SIGMETRICS, June 2005.
-
(2005)
Proceedings of the ACM SIGMETRICS
-
-
Moore, A.1
Zuev, D.2
-
12
-
-
33847256529
-
The Devil and Packet Trace Anonymization
-
January
-
R. Pang, M. Allman, V. Paxson, and J. Lee. The Devil and Packet Trace Anonymization. In ACM Computer Communication Review, 36(1), pages 29-38, January 2006.
-
(2006)
ACM Computer Communication Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
13
-
-
0018106375
-
Considerations in dynamic time warping algorithms for discrete word recognition
-
December
-
L. Rabiner, A. Rosenberg, and S. Levinson. Considerations in dynamic time warping algorithms for discrete word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing, 26(6):575-582, December 1978.
-
(1978)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.26
, Issue.6
, pp. 575-582
-
-
Rabiner, L.1
Rosenberg, A.2
Levinson, S.3
-
16
-
-
34547291734
-
On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research, Special Topic on Machine Learning for Computer Security
-
to appear
-
C. V. Wright, F. Monrose, and G. M. Masson. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research, Special Topic on Machine Learning for Computer Security. (to appear).
-
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
-
17
-
-
13944256121
-
Visfiowconnect: Netflow visualizations of link relationships for security situational awareness
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju. Visfiowconnect: netflow visualizations of link relationships for security situational awareness. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 26-34, 2004.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
|