-
1
-
-
0001882616
-
Fast algorithms for mining association rules in large databases
-
September 12-15, Santiago de Chile, Chile, Morgan Kaufmann, 1994
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In VLDB'94, Proceedings of 20th International Conference on Very Large Data Bases, September 12-15, 1994, Santiago de Chile, Chile, pages 487-499. Morgan Kaufmann, 1994.
-
(1994)
VLDB'94, Proceedings of 20th International Conference on Very Large Data Bases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
New York, NY, USA, ACM Press
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pages 71-82, New York, NY, USA, 2002. ACM Press.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
5
-
-
34547803269
-
Summarization - compressing data into an informative representation
-
V. Chandola and V. Kumar. Summarization - compressing data into an informative representation. Knowl. Inf. Syst., 12:355-378, 2007.
-
(2007)
Knowl. Inf. Syst.
, vol.12
, pp. 355-378
-
-
Chandola, V.1
Kumar, V.2
-
6
-
-
39149089260
-
Finding hierarchical heavy hitters in streaming data
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava. Finding hierarchical heavy hitters in streaming data. ACM Trans. Knowl. Discov. Data, 1(4):1-48, 2008.
-
(2008)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.4
, pp. 1-48
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
7
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
New York, NY, USA, ACM Press
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In LSAD '07: Proceedings of the 2007 workshop on Large scale attack defense, pages 145-152, New York, NY, USA, 2007. ACM Press.
-
(2007)
LSAD '07: Proceedings of the 2007 Workshop on Large Scale Attack Defense
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
8
-
-
1242310086
-
Automatically inferring patterns of resource consumption in network traffic
-
New York, NY, USA, ACM Press
-
C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 137-148, New York, NY, USA, 2003. ACM Press.
-
(2003)
SIGCOMM '03: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 137-148
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
9
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Berkeley, CA, USA, USENIX Association
-
Y. Gu, A. McCallum, and D. Towsley. Detecting anomalies in network traffic using maximum entropy estimation. In IMC '05: Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, pages 32-32, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
IMC '05: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement
, pp. 32-32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
10
-
-
65249128484
-
What's going on?: Learning communication rules in edge networks
-
S. Kandula, R. Chandra, and D. Katabi. What's going on?: learning communication rules in edge networks. In SIGCOMM, pages 87-98, 2008.
-
(2008)
SIGCOMM
, pp. 87-98
-
-
Kandula, S.1
Chandra, R.2
Katabi, D.3
-
12
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
New York, NY, USA, ACM Press
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen. Sketch-based change detection: methods, evaluation, and applications. In IMC '03: Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pages 234-247, New York, NY, USA, 2003. ACM Press.
-
(2003)
IMC '03: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
13
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
New York, NY, USA, ACM Press
-
A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In SIGCOMM '04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pages 219-230, New York, NY, USA, 2004. ACM Press.
-
(2004)
SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
14
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
New York, NY, USA, ACM
-
A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. In SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pages 217-228, New York, NY, USA, 2005. ACM.
-
(2005)
SIGCOMM '05: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
15
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
New York, NY, USA, ACM
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and identification of network anomalies using sketch subspaces. In IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pages 147-152, New York, NY, USA, 2006. ACM.
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
16
-
-
78149297786
-
Learning rules for anomaly detection of hostile network traffic
-
Washington, DC, USA, IEEE Computer Society
-
M. V. Mahoney and P. K. Chan. Learning rules for anomaly detection of hostile network traffic. In ICDM '03: Proceedings of the Third IEEE International Conference on Data Mining, pages 601-604, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
ICDM '03: Proceedings of the Third IEEE International Conference on Data Mining
, pp. 601-604
-
-
Mahoney, M.V.1
Chan, P.K.2
-
17
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3:262-294, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
18
-
-
67650330261
-
Scan surveillance in internet networks
-
K. H. Ramah, K. Salamatian, and F. Kamoun. Scan surveillance in internet networks. In Networking, pages 614-625, 2009.
-
(2009)
Networking
, pp. 614-625
-
-
Ramah, K.H.1
Salamatian, K.2
Kamoun, F.3
-
19
-
-
34548301939
-
Dowitcher: Effective worm detection and containment in the internet core
-
S. Ranjan, S. Shah, A. Nucci, M. M. Munafò, R. L. Cruz, and S. M. Muthukrishnan. Dowitcher: Effective worm detection and containment in the internet core. In INFOCOM, pages 2541-2545, 2007.
-
(2007)
INFOCOM
, pp. 2541-2545
-
-
Ranjan, S.1
Shah, S.2
Nucci, A.3
Munafò, M.M.4
Cruz, R.L.5
Muthukrishnan, S.M.6
-
20
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
Berkeley, California, USA, October 19-21, USENIX Association, 2005
-
A. Soule, K. Salamatian, and N. Taft. Combining filtering and statistical methods for anomaly detection. In IMC'05: Proceedings of the 5th Conference on Internet Measurement 2005, Berkeley, California, USA, October 19-21, 2005, pages 331-344. USENIX Association, 2005.
-
(2005)
IMC'05: Proceedings of the 5th Conference on Internet Measurement 2005
, pp. 331-344
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
21
-
-
43949111011
-
A two-layered anomaly detection technique based on multi-modal flow behavior models
-
Lecture Notes in Computer Science, Springer
-
M. P. Stoecklin, J.-Y. L. Boudec, and A. Kind. A two-layered anomaly detection technique based on multi-modal flow behavior models. In PAM: Proceedings of 9th International Conference on Passive and Active Measurement, Lecture Notes in Computer Science, pages 212-221. Springer, 2008.
-
(2008)
PAM: Proceedings of 9th International Conference on Passive and Active Measurement
, pp. 212-221
-
-
Stoecklin, M.P.1
Boudec, J.-Y.L.2
Kind, A.3
-
22
-
-
33846200876
-
Entropy based worm and anomaly detection in fast IP networks
-
Washington, DC, USA, IEEE Computer Society
-
A. Wagner and B. Plattner. Entropy based worm and anomaly detection in fast ip networks. In WETICE '05: Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, pages 172-177, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
WETICE '05: Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
, pp. 172-177
-
-
Wagner, A.1
Plattner, B.2
-
23
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
New York, NY, USA, ACM.ETH Zurich, September 2009
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 101-114, New York, NY, USA, 2004. ACM.ETH Zurich, September 2009.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
|