-
1
-
-
84893496533
-
Aberrant Behavior Detection in Time Series for Network Monitoring
-
New Orleans, LA, Dec
-
J. D. Brutlag, "Aberrant Behavior Detection in Time Series for Network Monitoring," Proc. 74th Sys. Admin. Conf., New Orleans, LA, Dec. 2000, pp. 139-46.
-
(2000)
Proc. 74th Sys. Admin. Conf
, pp. 139-146
-
-
Brutlag, J.D.1
-
2
-
-
18144385431
-
Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks
-
Dallas, TX, Nov
-
V. A. Siris and F. Papagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks," Proc. IEEE GLOBECOM Dallas, TX, Nov. 2004, pp. 2050-54.
-
(2004)
Proc. IEEE GLOBECOM
, pp. 2050-2054
-
-
Siris, V.A.1
Papagalou, F.2
-
3
-
-
57849168781
-
Prediction and Adaptation in a Traffic-Aware Packet Filtering Method,
-
Master's thesis, EPFL, Lausanne, Switzerland, Mar
-
C. Schwarzer, "Prediction and Adaptation in a Traffic-Aware Packet Filtering Method," Master's thesis, EPFL, Lausanne, Switzerland, Mar. 2006.
-
(2006)
-
-
Schwarzer, C.1
-
4
-
-
51749125078
-
A Statistical Approach to Anomaly Detection in Interdomain Routing
-
San Jose, CA, Oct
-
S. Deshpande et al., "A Statistical Approach to Anomaly Detection in Interdomain Routing," Proc. 3rd Int'l. Conf. Broadband Commun., Netw., and Sys. (BROADNETS), San Jose, CA, Oct. 2006.
-
(2006)
Proc. 3rd Int'l. Conf. Broadband Commun., Netw., and Sys. (BROADNETS)
-
-
Deshpande, S.1
-
5
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
Oct
-
H. Wang, D. Xhang, and K. G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Trans. Dependable Secure Comp., vol. 1, no. 4, Oct. 2004, pp. 193-208.
-
(2004)
IEEE Trans. Dependable Secure Comp
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Xhang, D.2
Shin, K.G.3
-
6
-
-
0141427794
-
A Signal Analysis of Network Traffic Anomalies
-
Marseille, France, Nov
-
P. Barford et al., "A Signal Analysis of Network Traffic Anomalies," Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement, Marseille, France, Nov. 2002, pp. 71-82.
-
(2002)
Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement
, pp. 71-82
-
-
Barford, P.1
-
7
-
-
84878701863
-
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
-
Berkeley, CA, Oct
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation," Proc. 5th ACM SIGCOMM Conf. Internet Measurement, Berkeley, CA, Oct. 2005.
-
(2005)
Proc. 5th ACM SIGCOMM Conf. Internet Measurement
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
8
-
-
57849087571
-
An Architecture for Distributed Real-Time Passive Network Measurement
-
Monterey, CA, Sept
-
T. Wolf et al., 'An Architecture for Distributed Real-Time Passive Network Measurement," Proc. 74th Annual Meeting IEEE/ACM Int'l. Symp. Modeling, Analysis, and Simulation Comp. and Telecommun. Sys., Monterey, CA, Sept. 2006, pp. 335-44.
-
(2006)
Proc. 74th Annual Meeting IEEE/ACM Int'l. Symp. Modeling, Analysis, and Simulation Comp. and Telecommun. Sys
, pp. 335-344
-
-
Wolf, T.1
-
9
-
-
57849114377
-
Massively Parallel Anomaly Detection in Online Network Measurement
-
St. Thomas, U.S. Virgin Islands, Aug
-
S. Shanbhag and T. Wolf, "Massively Parallel Anomaly Detection in Online Network Measurement," Proc. 77th IEEE ICCCN, St. Thomas, U.S. Virgin Islands, Aug. 2008.
-
(2008)
Proc. 77th IEEE ICCCN
-
-
Shanbhag, S.1
Wolf, T.2
-
10
-
-
67249166209
-
Evaluation of an Online Parallel Anomaly Detection System
-
New Orleans, LA, Dec
-
S. Shanbhag and T. Wolf, "Evaluation of an Online Parallel Anomaly Detection System," Proc. IEEE GLOBECOM, New Orleans, LA, Dec. 2008.
-
(2008)
Proc. IEEE GLOBECOM
-
-
Shanbhag, S.1
Wolf, T.2
-
11
-
-
50649100899
-
Challenges and Applications for Network-Processor-Based Programmable Routers
-
Princeton, NJ, Mar
-
T. Wolf, "Challenges and Applications for Network-Processor-Based Programmable Routers," Proc. IEEE Sarnoff Symp., Princeton, NJ, Mar. 2006.
-
(2006)
Proc. IEEE Sarnoff Symp
-
-
Wolf, T.1
-
12
-
-
47649122510
-
A Characterization of High-Performance Network Monitoring Systems and Workloads
-
Brooklyn, NY, May
-
S. Bunga and T. Wolf, "A Characterization of High-Performance Network Monitoring Systems and Workloads," Proc. IEEE Wksp. High Perf. Switching and Routing, Brooklyn, NY, May 2007.
-
(2007)
Proc. IEEE Wksp. High Perf. Switching and Routing
-
-
Bunga, S.1
Wolf, T.2
-
13
-
-
40649113159
-
Data Fusion for Outlier Detection Through Pseudo-ROC Curves an Rank Distributions
-
Vancouver, BC, July
-
P. F. Evangelista, M. J. Embrechts, and B. K. Szymanski, "Data Fusion for Outlier Detection Through Pseudo-ROC Curves an Rank Distributions," Proc. Int'l. Joint Conf. Neural Net., Vancouver, BC, July 2006, pp. 2166-73.
-
(2006)
Proc. Int'l. Joint Conf. Neural Net
, pp. 2166-2173
-
-
Evangelista, P.F.1
Embrechts, M.J.2
Szymanski, B.K.3
-
14
-
-
1242287724
-
A Framework for Classifying Denial of Service Attacks
-
Karlsruhe, Germany, Aug
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A Framework for Classifying Denial of Service Attacks," Proc. SIGCOMM '03, Karlsruhe, Germany, Aug. 2003, pp. 99-110.
-
(2003)
Proc. SIGCOMM '03
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
15
-
-
0141762461
-
Code-Red: A Case Study on the Spread and Victims of an Internet Worm
-
Marseille, France, Nov
-
D. Moore, C. Shannon, and J. Brown, 'Code-Red: A Case Study on the Spread and Victims of an Internet Worm," Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement, Marseille, France, Nov. 2002, pp. 273-84.
-
(2002)
Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
16
-
-
84962260018
-
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation
-
Hilton Head, SC, Jan
-
R. P. Lippmarm et al., "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. DARPA Info. Suryivability Conf. Expo., Hilton Head, SC, vol. 2, Jan. 2000, pp. 12-26.
-
(2000)
Proc. DARPA Info. Suryivability Conf. Expo
, vol.2
, pp. 12-26
-
-
Lippmarm, R.P.1
|