-
1
-
-
46349110764
-
Sketch based anomaly detection, identification and performance evaluation
-
In, IEEE Computer Society, Washington, DC
-
Abry, P., Borgnat, P. and Dewaele, G. (2007). Sketch based anomaly detection, identification and performance evaluation. In Proceedings of the 2007 International Symposium on Applications and the Internet Workshops 80. IEEE Computer Society, Washington, DC.
-
(2007)
Proceedings of the 2007 International Symposium on Applications and the Internet Workshops 80.
-
-
Abry, P.1
Borgnat, P.2
Dewaele, G.3
-
6
-
-
84951601829
-
A generalized Wilcoxon test for comparing arbitrarily single censored samples
-
Gehan, E. (1965). A generalized Wilcoxon test for comparing arbitrarily single censored samples. Biometrika 52 203-223.
-
(1965)
Biometrika
, vol.52
, pp. 203-223
-
-
Gehan, E.1
-
7
-
-
0034344429
-
A nonparametric test for change in randomly censored data
-
Gombay, E. and Liu, S. (2000). A nonparametric test for change in randomly censored data. Can. J. Statist. 28 113-121.
-
(2000)
Can. J. Statist.
, vol.28
, pp. 113-121
-
-
Gombay, E.1
Liu, S.2
-
8
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation and applications
-
In ACM, New York
-
Krishnamurthy, B., Subhabrata, S., Zhang, Y. and Chen, Y. (2003). Sketch-based change detection: Methods, evaluation and applications. InProceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement234-247. ACM, New York.
-
(2003)
Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 234-247
-
-
Krishnamurthy, B.1
Subhabrata, S.2
Zhang, Y.3
Chen, Y.4
-
9
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
In ACM, New York
-
Lakhina, A., Crovella, M. and Diot, C. (2004). Diagnosing network-wide traffic anomalies. In Proceedings of the 2004 Conference of Applications, Technologies, Architectures, and Protocols for Computer Comunnications219-230. ACM, New York.
-
(2004)
Proceedings of the 2004 Conference of Applications, Technologies, Architectures, and Protocols for Computer Comunnications
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
11
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
In. ACM, New York
-
Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G. and Lakhina, A. (2006). Detection and identification of network anomalies using sketch subspaces. In Proceedings of SIGCOMM 147-152. ACM, New York.
-
(2006)
Proceedings of SIGCOMM
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
13
-
-
0014060670
-
Ranking procedures for arbitrarily restricted observations
-
Mantel, N. (1967). Ranking procedures for arbitrarily restricted observations. Biometrics 23 65-78.
-
(1967)
Biometrics
, vol.23
, pp. 65-78
-
-
Mantel, N.1
-
15
-
-
0002916530
-
Continuous inspection schemes
-
Page, E. S. (1954). Continuous inspection schemes. Biometrika 41 100-115.
-
(1954)
Biometrika
, vol.41
, pp. 100-115
-
-
Page, E.S.1
-
16
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V. (1999). Bro: A system for detecting network intruders in real-time. Computer Network 31 2435-2463.
-
(1999)
Computer Network
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
17
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
In USENIX Association, Berkeley, CA
-
Roesch, M. (1999). Snort: Lightweight intrusion detection for networks. InProceedings of LISA'99 229-238. USENIX Association, Berkeley, CA.
-
(1999)
Proceedings of LISA'99
, pp. 229-238
-
-
Roesch, M.1
-
18
-
-
79951498665
-
A novel approach for anomaly detection over high-speed networks
-
In
-
Salem, O., Vaton, S. and Gravey, A. (2007). A novel approach for anomaly detection over high-speed networks. In Proceedings of EC2ND.
-
(2007)
Proceedings of EC2ND.
-
-
Salem, O.1
Vaton, S.2
Gravey, A.3
-
19
-
-
33646423315
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Siris, A. and Papagalou, F. (2004). Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications 29 1433-1442.
-
(2004)
Computer Communications
, vol.29
, pp. 1433-1442
-
-
Siris, A.1
Papagalou, F.2
-
20
-
-
33746983029
-
Detection of intrusion in information systems by sequential change-point methods
-
Tartakovsky, A., Rozovskii, B., Blazek, R. and Kim, H. (2006a). Detection of intrusion in information systems by sequential change-point methods. Statist. Methodol. 3 252-340.
-
(2006)
Statist. Methodol.
, vol.3
, pp. 252-340
-
-
Tartakovsky, A.1
Rozovskii, B.2
Blazek, R.3
Kim, H.4
-
21
-
-
33947171900
-
A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
-
Tartakovsky, A., Rozovskii, B., Blazek, R. and Kim, H. (2006b). A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Transactions on Signal Processing 54 3372-3382.
-
(2006)
IEEE Transactions on Signal Processing
, vol.54
, pp. 3372-3382
-
-
Tartakovsky, A.1
Rozovskii, B.2
Blazek, R.3
Kim, H.4
|