-
2
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. IMW '02, pages 71-82, 2002.
-
(2002)
IMW '02
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
4
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. LSAD '07, pages 145-152, 2007.
-
(2007)
LSAD '07
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
5
-
-
0015285440
-
Use of the hough transformation to detect lines and curves in pictures
-
R. O. Duda and P. E. Hart. Use of the hough transformation to detect lines and curves in pictures. Commun. ACM, 15(1):11-15, 1972.
-
(1972)
Commun. ACM
, vol.15
, Issue.1
, pp. 11-15
-
-
Duda, R.O.1
Hart, P.E.2
-
6
-
-
38149030783
-
Nada - network anomaly detection algorithm
-
S. Farraposo, P. Owezarski, and E. Monteiro. Nada - network anomaly detection algorithm. DSOM '07, 4785:191-194, 2007.
-
(2007)
DSOM '07
, vol.4785
, pp. 191-194
-
-
Farraposo, S.1
Owezarski, P.2
Monteiro, E.3
-
7
-
-
0003761433
-
Method and means for recognizing complex patterns.
-
U.S. Patent 3,069,654
-
P. Hough. Method and means for recognizing complex patterns. U.S. Patent 3,069,654, 1962.
-
(1962)
-
-
Hough, P.1
-
8
-
-
33845536096
-
Detecting traffic anomalies at the source through aggregate analysis of packet header data
-
S. S. Kim and A. L. N. Reddy. Detecting traffic anomalies at the source through aggregate analysis of packet header data. Proc. of Networking 2004, pages 1047-1059, 2004.
-
(2004)
Proc. of Networking 2004
, pp. 1047-1059
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
9
-
-
24344452007
-
A study of analyzing network traffic as images in real-time
-
S. S. Kim and A. L. N. Reddy. A study of analyzing network traffic as images in real-time. INFOCOM '05, pages 2056-2067, 2005.
-
(2005)
INFOCOM '05
, pp. 2056-2067
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
10
-
-
33646742035
-
Packetscore: A statics-based packet filtering scheme against distributed denial-of-service attacks
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao. Packetscore: A statics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. on Dependable and Secure Computing, 3(2):141-155, 2006.
-
(2006)
IEEE Trans. on Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
11
-
-
1242287727
-
Low-rate tcp-targeted denial of service attacks: The shrew vs. the mice and elephants
-
A. Kuzmanovic and E. W. Knightly. Low-rate tcp-targeted denial of service attacks: the shrew vs. the mice and elephants. SIGCOMM '03, pages 75-86, 2003.
-
(2003)
SIGCOMM '03
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
12
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. SIGCOMM '05, pages 217-228, 2005.
-
(2005)
SIGCOMM '05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
13
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and identification of network anomalies using sketch subspaces. SIGCOMM '06, pages 147-152, 2006.
-
(2006)
SIGCOMM '06
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
14
-
-
14944369649
-
Characteristics of internet background radiation
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of internet background radiation. IMC '04, pages 27-40, 2004.
-
(2004)
IMC '04
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
15
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31 (23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
17
-
-
70349114770
-
Network anomography
-
Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan. Network anomography. IMC '05, pages 1-14, 2005.
-
(2005)
IMC '05
, pp. 1-14
-
-
Zhang, Y.1
Ge, Z.2
Greenberg, A.3
Roughan, M.4
|