-
3
-
-
77955131278
-
On the use of sketches and wavelet analysis for network anomaly detection
-
ACM New York, NY, USA pp. 331-335
-
C. Callegari, S. Giordano, M. Pagano, and T. Pepe On the use of sketches and wavelet analysis for network anomaly detection Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC '10 2010 ACM New York, NY, USA pp. 331-335
-
(2010)
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC '10
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
Pepe, T.4
-
4
-
-
33751110003
-
Wavelet based Denial-of-Service detection
-
DOI 10.1016/j.cose.2006.08.017, PII S0167404806001210
-
G. Carl, R.R. Brooks, and S. Rai Wavelet based denial-of-service detection Computers and Security 25 8 2006 600 615 (Pubitemid 44765088)
-
(2006)
Computers and Security
, vol.25
, Issue.8
, pp. 600-615
-
-
Carl, G.1
Brooks, R.R.2
Rai, S.3
-
5
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Cheng C-M, Kung HT Tan K-S. Use of spectral analysis in defense against DoS attacks, in: Proceedings of the IEEE GLOBECOM, vol. 3, 2002, pp. 2143-2148.
-
(2002)
Proceedings of the IEEE GLOBECOM
, vol.3
, pp. 2143-2148
-
-
Cheng, C.-M.1
Kung, H.T.2
Tan, K.-S.3
-
7
-
-
14844367057
-
An improved data stream summary: The count-min sketch and its applications
-
DOI 10.1016/j.jalgor.2003.12.001, PII S0196677403001913
-
G. Cormode, and S. Muthukrishnan An improved data stream summary: the count-min sketch and its applications Journal of Algorithms 55 1 2005 58 75 (Pubitemid 40357145)
-
(2005)
Journal of Algorithms
, vol.55
, Issue.1
, pp. 58-75
-
-
Cormode, G.1
Muthukrishnan, S.2
-
10
-
-
62949129764
-
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
-
ACM New York, NY, USA
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures LSAD '07: Proceedings of the 2007 workshop on Large scale attack defense 2007 ACM New York, NY, USA 145 152
-
(2007)
LSAD '07: Proceedings of the 2007 Workshop on Large Scale Attack Defense
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
11
-
-
0035331278
-
Multiscale Analysis and Data Networks
-
DOI 10.1006/acha.2000.0342, PII S1063520300903427
-
A.C. Gilbert Multiscale analysis and data networks Applied and Computational Harmonic Analysis 10 1996 185 202 (Pubitemid 33675917)
-
(2001)
Applied and Computational Harmonic Analysis
, vol.10
, Issue.3
, pp. 185-202
-
-
Gilbert, A.C.1
-
12
-
-
35148840623
-
Detecting Denial-of-Service attacks using the wavelet transform
-
DOI 10.1016/j.comcom.2007.05.061, PII S0140366407002678, Advances in Communication Networking
-
M. Hamdi, and N. Boudriga Detecting denial-of-service attacks using the wavelet transform Computer Communications 30 2007 3203 3213 (Pubitemid 47552558)
-
(2007)
Computer Communications
, vol.30
, Issue.16
, pp. 3203-3213
-
-
Hamdi, M.1
Boudriga, N.2
-
16
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Proceedings of the 2003 ACM SIGCOMM Internet Measurement Conference, IMC 2003
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen Sketch-based change detection: methods, evaluation, and applications Internet measurement Conference 2003 234 247 (Pubitemid 40730656)
-
(2003)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
17
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
DOI 10.1145/1090191.1080118
-
A. Lakhina, M. Crovella, and C. Diot Mining anomalies using traffic feature distributions SIGCOMM Computer Communication Review 35 4 2005 217 228 (Pubitemid 46323506)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
18
-
-
17444397467
-
DDoS attack detection and wavelets
-
DOI 10.1007/s11235-004-5581-0, Advance Technologies in Communications and Networks
-
L. Li, and G. Lee DDoS attack detection and wavelets Telecommunication Systems 28 2005 435 451 (Pubitemid 40536354)
-
(2005)
Telecommunication Systems
, vol.28
, Issue.3-4
, pp. 435-451
-
-
Li, L.1
Lee, G.2
-
24
-
-
1842435123
-
Tabulation based 4-universal hashing with applications to second moment estimation
-
Society for Industrial and Applied Mathematics Philadelphia, PA, USA
-
M. Thorup, and Y. Zhang Tabulation based 4-universal hashing with applications to second moment estimation SODA '04: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms 2004 Society for Industrial and Applied Mathematics Philadelphia, PA, USA 615 624
-
(2004)
SODA '04: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 615-624
-
-
Thorup, M.1
Zhang, Y.2
|