-
1
-
-
42149143451
-
Network monitoring using traffic dispersion graphs (tdgs)
-
ACM, New York, NY, USA, DOI
-
Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M. Singh, S. and Varghese, G. Network monitoring using traffic dispersion graphs (tdgs). In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (IMC '07). ACM, New York, NY, USA, 2007, 315-320. DOI= http://doi.acm.org/10.1145/1298306. 1298349
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC '07)
, pp. 315-320
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
2
-
-
79957908678
-
-
accessed on 2011-05-10
-
Hick, P., Aben, E., Claffy, K. and Polterock, J.2007.The CAIDA DDoS Attack 2007 Dataset. http://www.caida.org/data/passive/ddos- 20070804dataset.xml (accessed on 2011-05-10).
-
(2007)
The CAIDA DDoS Attack 2007 Dataset
-
-
Hick, P.1
Aben, E.2
Claffy, K.3
Polterock, J.4
-
3
-
-
51349123114
-
Anomaly detection in data represented as graphs
-
2007
-
Eberle, W. and Holder, L. 2007. Anomaly detection in data represented as graphs. Intelligent Data Analysis, 2007, vol. 11, pp. 663-689.
-
(2007)
Intelligent Data Analysis
, vol.11
, pp. 663-689
-
-
Eberle, W.1
Holder, L.2
-
5
-
-
0033899045
-
Graph-based data mining
-
Cook, D.J. and Holder, L.B. 2000. Graph-based data mining. IEEE Intelligent Systems, 2000, 15(2), pages 32-41. (Pubitemid 30587666)
-
(2000)
IEEE Intelligent Systems and Their Applications
, vol.15
, Issue.2
, pp. 32-41
-
-
Cook, D.J.1
Holder, L.B.2
-
6
-
-
12244300520
-
Eigenspace-based anomaly detection in computer systems
-
Ide, T. and Kashima, H. 2004. Eigenspace-based anomaly detection in computer systems. Conference on Knowledge Discovery in Data: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, 2004, 22(25):440-449.
-
(2004)
Conference on Knowledge Discovery in Data: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004
, vol.22
, Issue.25
, pp. 440-449
-
-
Ide, T.1
Kashima, H.2
-
7
-
-
36849035825
-
GraphScope: Parameter-free mining of large time-evolving graphs
-
Sun, J., Faloutsos, C., Papadimitriou, S. and Yu, P.S. 2007. GraphScope: parameter-free mining of large time-evolving graphs. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, 2007, pages 687-696.
-
(2007)
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007
, pp. 687-696
-
-
Sun, J.1
Faloutsos, C.2
Papadimitriou, S.3
Yu, P.S.4
-
8
-
-
68049121093
-
Anomaly detection: A survey
-
(July 2009), Article 15
-
Chandola, V., Banerjee, A. and Kumar, V. 2009. Anomaly detection: A survey. ACM Comput. Surv, (July 2009), Article 15, 58 pages. DOI= http://doi.acm.org/10.1145/1541880.1541882
-
(2009)
ACM Comput. Surv
, pp. 58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
9
-
-
72749114319
-
Using graph to detect network traffic anomaly
-
Zhou, Y., Hu, G., He, W. 2009. Using graph to detect network traffic anomaly. Conference on Communications Circuits and Systems, 2009. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5 250514
-
(2009)
Conference on Communications Circuits and Systems, 2009
-
-
Zhou, Y.1
Hu, G.2
He, W.3
-
10
-
-
76749108118
-
Exploiting dynamicity in graph-based traffic analysis: Techniques and applications
-
ACM, New York, NY, USA, 2009
-
Iliofotou, M., Faloutsos, M. and Mitzenmacher, M. 2009. Exploiting dynamicity in graph-based traffic analysis: techniques and applications. In Proceedings of the 5th international conference on Emerging networking experiments and technologies (CoNEXT '09). ACM, New York, NY, USA, 2009, 241-252. DOI= http://doi.acm.org/10.1145/1658939.1658967
-
(2009)
Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT '09)
, pp. 241-252
-
-
Iliofotou, M.1
Faloutsos, M.2
Mitzenmacher, M.3
-
12
-
-
57349152519
-
-
Technical Report, Stanford University, 2008
-
Papadimitriou, P., Dasdan, A. and Garcia-Molina, H. 2008. Web graph similarity for anomaly detection. Technical Report, Stanford University, 2008. http://dbpubs.stanford.edu/pub/2008-1.pdf
-
(2008)
Web Graph Similarity for Anomaly Detection
-
-
Papadimitriou, P.1
Dasdan, A.2
Garcia-Molina, H.3
-
13
-
-
77954613479
-
Measurement-calibrated graph models for social network experiments
-
2010
-
Sala, A., Cao, L., Wilson, C., Zablit, R., Zheng, H. and Zhao, B. 2010. Measurement-calibrated graph models for social network experiments. In WWW, 2010, pages 861-870.
-
(2010)
WWW
, pp. 861-870
-
-
Sala, A.1
Cao, L.2
Wilson, C.3
Zablit, R.4
Zheng, H.5
Zhao, B.6
-
14
-
-
84876249391
-
Orbis: Rescaling degree correlations to generate annotated Internet topologies
-
2007
-
Mahadevan, P., Hubble, C., Krioukov, D., Huffaker, B., Vahdat, A. 2007. Orbis: rescaling degree correlations to generate annotated Internet topologies. SIGCOMM Computer Communications Review, 2007, 325-336.
-
(2007)
SIGCOMM Computer Communications Review
, pp. 325-336
-
-
Mahadevan, P.1
Hubble, C.2
Krioukov, D.3
Huffaker, B.4
Vahdat, A.5
-
15
-
-
3142716665
-
Thirty years of graph matching in pattern recognition
-
2004
-
Conte, D., Foggia, P., Sansone, C., Vento, M. 2004. Thirty years of graph matching in pattern recognition. International Journal of Pattern Recognition and Artificial Intelligence, 2004, 18 (3) 265-298.
-
(2004)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.18
, Issue.3
, pp. 265-298
-
-
Conte, D.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
17
-
-
4644303571
-
A (Sub)Graph isomorphism algorithm for matching large graphs
-
(October 2004), DOI
-
Cordella, L.P., Foggia, P., Sansone, C. and Vento, M. 2004. A (Sub)Graph isomorphism algorithm for matching large graphs. IEEE Trans. Pattern Anal. Mach. Intell. 26, 10 (October 2004), 1367-1372. DOI= http://dx.doi.org/10.1109/TPAMI. 2004.75
-
(2004)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.26
, Issue.10
, pp. 1367-1372
-
-
Cordella, L.P.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
18
-
-
2942673158
-
Internet traffic monitoring and analysis using NG-MON. POSTECH, Advanced Communication Technology
-
Hong, J.W. 2004. Internet traffic monitoring and analysis using NG-MON. POSTECH, Advanced Communication Technology. The 6th International Conference, 2004, Volume: 1, page(s): 100- 120. http://ieeexplore.ieee.org/iel5/9073/28786/ 01292840.pdf
-
(2004)
The 6th International Conference, 2004
, vol.1
, pp. 100-120
-
-
Hong, J.W.1
-
20
-
-
82955205330
-
Basic Network Metrics
-
Whitney, D. 2008. Basic Network Metrics. Lecture note. http://ocw.mit.edu/courses/engineering-systems-division/esd- 342-network-representations-of-complex-engineeringsystems- spring- 2010/readings/MITESD-342S10-ntwk-metrics.pdf
-
(2008)
Lecture Note
-
-
Whitney, D.1
|