-
1
-
-
0028377540
-
On the self-similar nature of ethernet traffic (Extended version)
-
1
-
W. E. Leland, M. S. Taqqu, W. Willinger, et al. On the self-similar nature of ethernet traffic (Extended version). IEEE/ACM Trans. on Networking, 2(1994)1, 1-15.
-
(1994)
IEEE/ACM Trans. on Networking
, vol.2
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
-
2
-
-
0029323403
-
Wide area traffic: The failure of Poisson modeling
-
3
-
V. Paxson and S. Floyd. Wide area traffic: The failure of Poisson modeling. IEEE/ACM Trans. on Networking, 3(1995)3, 226-244.
-
(1995)
IEEE/ACM Trans. on Networking
, vol.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
3
-
-
33947637104
-
Principal component analysis of the fractional brownian motion for 0
-
Toulouse, France, May 21-24
-
T. E. Ozkurt, T. Akgul, and S. Baykut. Principal component analysis of the fractional brownian motion for 0
-
(2006)
Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP'2006)
, vol.3
, pp. 488-491
-
-
Ozkurt, T.E.1
Akgul, T.2
Baykut, S.3
-
4
-
-
42749105299
-
Congestion prediction of self-similar network through parameter estimation
-
Vancouver, Canada, April 5
-
Y. G. Kim, A. Shiravi, and P. S. Min. Congestion prediction of self-similar network through parameter estimation. Network Operations and Management Symposium, Vancouver, Canada, April 5, 2006, 1-4.
-
(2006)
Network Operations and Management Symposium
, pp. 1-4
-
-
Kim, Y.G.1
Shiravi, A.2
Min, P.S.3
-
5
-
-
27944511551
-
An in-depth, analytical study of sampling techniques for self-similar internet traffic
-
Columbus, OH, June 6-10
-
Guanghui He and J. C. Hou. An in-depth, analytical study of sampling techniques for self-similar internet traffic. The 25th International Conference on Distributed Computing Systems, Columbus, OH, June 6-10, 2005, 404-413.
-
(2005)
The 25th International Conference on Distributed Computing Systems
, pp. 404-413
-
-
Guanghui, H.1
Hou, J.C.2
-
6
-
-
3142512777
-
Detecting DDoS attack based on network self-similarity
-
3
-
Y. Xiang, Y. Lin, W. L. Lei, et al. Detecting DDoS attack based on network self-similarity. IEE Proceeding on Communications, 151(2004)3, 292-295.
-
(2004)
IEE Proceeding on Communications
, vol.151
, pp. 292-295
-
-
Xiang, Y.1
Lin, Y.2
Lei, W.L.3
-
7
-
-
0031379122
-
Estimation of Hurst parameter by variance-time plots
-
Victoria, BC, Canada, Aug. 20-22
-
H. F. Zhang, Y. T. Shu, and Oliver Yang. Estimation of Hurst parameter by variance-time plots. Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, BC, Canada, Aug. 20-22, 1997, vol.2, 883-886.
-
(1997)
Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
, vol.2
, pp. 883-886
-
-
Zhang, H.F.1
Shu, Y.T.2
Yang, O.3
-
9
-
-
3943075860
-
Fast real-time Hurst parameter estimation via adaptive wavelet lifting
-
7
-
D. Guo, X. Wang, and J. Zhang. Fast real-time Hurst parameter estimation via adaptive wavelet lifting. IEEE Trans. on Vehicular Technology, 53(2004)7, 1266-1273.
-
(2004)
IEEE Trans. on Vehicular Technology
, vol.53
, pp. 1266-1273
-
-
Guo, D.1
Wang, X.2
Zhang, J.3
-
10
-
-
0034543595
-
High-speed calculation method of the Hurst parameter based on real traffic
-
Tampa, Florida, USA, Nov. 8-10
-
T. Hagiwara, H. Doi, H. Tode, et al. High-speed calculation method of the Hurst parameter based on real traffic. Proceedings of the 25th Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, Nov. 8-10, 2000, 662-669.
-
(2000)
Proceedings of the 25th Annual IEEE Conference on Local Computer Networks
, pp. 662-669
-
-
Hagiwara, T.1
Doi, H.2
Tode, H.3
-
11
-
-
48249132555
-
-
Information Systems Technology Group of MIT Lincoln Laboratory June 18
-
Information Systems Technology Group of MIT Lincoln Laboratory. The 1999 DARPA intrusion detection evaluation data set. http://www.ll.mit.edu/IST/ideval, June 18, 2006.
-
(2006)
The 1999 DARPA Intrusion Detection Evaluation Data Set
-
-
-
12
-
-
29844454402
-
Hurst parameter estimation and characteristics analysis of aggregate wireless LAN traffic
-
Hong Kong, China, May 27-30
-
Qin Yu, Yuming Mao, Taijun Wang, et al. Hurst parameter estimation and characteristics analysis of aggregate wireless LAN traffic. Proceedings of the International Conference on Communications, Circuits and Systems, Hong Kong, China, May 27-30, 2005, vol.1, 339-345.
-
(2005)
Proceedings of the International Conference on Communications, Circuits and Systems
, vol.1
, pp. 339-345
-
-
Qin, Y.1
Yuming, M.2
Taijun, W.3
-
13
-
-
48249153960
-
-
Beijing, China, Tsinghua University Press, (in Chinese)
-
Lixin Wang and Yingjun Wang. A Course in Fuzzy Systems & Control. 1st ed. Beijing, China, Tsinghua University Press, 2003, 55-66 (in Chinese).
-
(2003)
A Course in Fuzzy Systems & Control. 1st Ed.
, Issue.1
, pp. 55-66
-
-
Wang, L.1
Wang, Y.2
-
14
-
-
0030693429
-
Fuzzy clustering model for asymmetry and self-similarity
-
Barcelona, Spain, July 1-5
-
M. Sato and Y. Sato. Fuzzy clustering model for asymmetry and self-similarity. Proceedings of the Sixth IEEE International Conference on Fuzzy Systems, Barcelona, Spain, July 1-5, 1997, vol.2, 963-968.
-
(1997)
Proceedings of the Sixth IEEE International Conference on Fuzzy Systems
, vol.2
, pp. 963-968
-
-
Sato, M.1
Sato, Y.2
-
15
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
Davis, CA, October 10-12
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, Davis, CA, October 10-12, 2001, 85-103.
-
(2001)
Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
16
-
-
33947181050
-
Detecting DDoS attacks by analyzing client response patterns
-
Saint Workshops, Italy, Jan. 31-Feb. 4
-
Y. Soejima, E. Y. Chen, and H. Fuji. Detecting DDoS attacks by analyzing client response patterns. Proceedings of the 2005 Symposium on Applications and the Internet Workshops, Saint Workshops, Italy, Jan. 31-Feb. 4, 2005, 98-101.
-
(2005)
Proceedings of the 2005 Symposium on Applications and the Internet Workshops
, pp. 98-101
-
-
Soejima, Y.1
Chen, E.Y.2
Fuji, H.3
-
17
-
-
0242460526
-
Web-log cleaning for constructing sequential classifiers
-
5
-
Qiang Yang and Ke Wang. Web-log cleaning for constructing sequential classifiers. Applied Artificial Intelligence, 17(2003)5, 431-441.
-
(2003)
Applied Artificial Intelligence
, vol.17
, pp. 431-441
-
-
Yang, Q.1
Wang, K.2
|