-
1
-
-
27244454402
-
Real Time Detection of Novel Attacks by Means of Data Mining Techniques
-
Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining Techniques. ICEIS (3), 120-127 (2005)
-
(2005)
ICEIS
, Issue.3
, pp. 120-127
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.P.4
Sansone, C.5
-
2
-
-
78650753809
-
Evaluating Pattern Recognition Techniques in Intrusion Detection Systems
-
Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. In: PRIS 2005, pp. 144-153 (2005)
-
(2005)
PRIS 2005
, pp. 144-153
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.P.4
Sansone, C.5
-
3
-
-
78650736995
-
INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks
-
FP7 INTERSECTION
-
FP7 INTERSECTION (INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks) Project - Description of Work
-
Project - Description of Work
-
-
-
4
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Cheng, C.-M., Kung, H.T., Tan, K.-S.: Use of spectral analysis in defense against DoS attacks. In: IEEE GLOBECOM 2002, pp. 2143-2148 (2002)
-
(2002)
IEEE GLOBECOM 2002
, pp. 2143-2148
-
-
Cheng, C.-M.1
Kung, H.T.2
Tan, K.-S.3
-
5
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: ACM SIGCOMM InternetMeasurement Workshop 2002 (2002)
-
(2002)
ACM SIGCOMM InternetMeasurement Workshop 2002
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
6
-
-
0003254064
-
A non-intrusive, wavelet-based approach to detecting network performance problems
-
Huang, P., Feldmann, A., Willinger, W.: A non-intrusive, wavelet-based approach to detecting network performance problems. In: ACM SIGCOMM Internet Measurement Workshop (November 2001)
-
ACM SIGCOMM Internet Measurement Workshop (November 2001)
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
7
-
-
84952326439
-
DDos attack detection and wavelets
-
Li, L., Lee, G.: DDos attack detection and wavelets. In: IEEE ICCCN 2003, October 2003, pp. 421-427 (2003)
-
(2003)
IEEE ICCCN 2003, October 2003
, pp. 421-427
-
-
Li, L.1
Lee, G.2
-
8
-
-
50949130514
-
Wavelet-based Detection of DoS Attacks
-
Dainotti, A., Pescape, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: 2006 IEEE GLOBECOM, San Francisco, CA, USA (November 2006)
-
2006 IEEE GLOBECOM, San Francisco, CA, USA (November 2006)
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
9
-
-
0027842081
-
Zhang: Matching Pursuit with time-frequency dictionaries
-
Mallat, S., Zhang: Matching Pursuit with time-frequency dictionaries. IEEE Transactions on Signal Processing 41(12), 3397-3415 (1993)
-
(1993)
IEEE Transactions on Signal Processing
, vol.41
, Issue.12
, pp. 3397-3415
-
-
Mallat, S.1
-
10
-
-
5444237123
-
Greed is Good: Algorithmic Results for Sparse Approximation
-
October
-
Troop, J.A.: Greed is Good: Algorithmic Results for Sparse Approximation. IEEE Transactions on Information Theory 50(10) (October 2004)
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, Issue.10
-
-
Troop, J.A.1
-
11
-
-
0035339685
-
Fast Matching Pursuit with a Multiscale Dictionary of Gaussian Chirps
-
Gribonval, R.: Fast Matching Pursuit with a Multiscale Dictionary of Gaussian Chirps. IEEE Transactions on Signal Processing 49(5) (2001)
-
(2001)
IEEE Transactions on Signal Processing
, vol.49
, Issue.5
-
-
Gribonval, R.1
-
12
-
-
72749087934
-
Tree-Based Pursuit: Algorithm and Properties
-
Swiss Federal Institute of Technology Lausanne (EPFL), TR-ITS-2005.013 May 17
-
Jost, P., Vandergheynst, P., Frossard, P.: Tree-Based Pursuit: Algorithm and Properties. Swiss Federal Institute of Technology Lausanne (EPFL),Signal Processing Institute Technical Report,TR-ITS-2005.013 (May 17, 2005)
-
(2005)
Signal Processing Institute Technical Report
-
-
Jost, P.1
Vandergheynst, P.2
Frossard, P.3
-
13
-
-
38549112565
-
Worm Traffic Analysis and Characterization
-
IEEE CS Press, Los Alamitos
-
Dainotti, A., Pescape, A., Ventre, G.: Worm Traffic Analysis and Characterization. In: Proceedings of ICC, pp. 1435-1442. IEEE CS Press, Los Alamitos (2007)
-
(2007)
Proceedings of ICC
, pp. 1435-1442
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
14
-
-
58049152310
-
Intrusion Detection System Based on Matching Pursuit
-
IEEE CS Press, Los Alamitos
-
Renk, R., Saganowski, Ł., Hołubowicz, W., Choraś, M.: Intrusion Detection System Based on Matching Pursuit. In: Proc. Intelligent Networks and Intelligent Systems, ICINIS 2008, pp. 213-216. IEEE CS Press, Los Alamitos (2008)
-
(2008)
Proc. Intelligent Networks and Intelligent Systems, ICINIS 2008
, pp. 213-216
-
-
Renk, R.1
Saganowski, Ł.2
Hołubowicz, W.3
Choraś, M.4
-
16
-
-
78650733439
-
-
March 19-24, Colleen Shanon and David Moore
-
The CAIDA Dataset on the Witty Worm - March 19-24, Colleen Shanon and David Moore (2004), http://www.caida.org/passive/witty
-
(2004)
The CAIDA Dataset on the Witty Worm
-
-
|