-
1
-
-
36949029788
-
Towards highly reliable enterprise network services via inference of multi-level dependencies
-
P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang. Towards highly reliable enterprise network services via inference of multi-level dependencies. In Sigcomm, 2007.
-
(2007)
Sigcomm
-
-
Bahl, P.1
Chandra, R.2
Greenberg, A.3
Kandula, S.4
Maltz, D.A.5
Zhang, M.6
-
2
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW, 2002.
-
(2002)
IMW
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
3
-
-
70349680977
-
Applying PCA for traffic anomaly detection: Problems and solutions
-
D. Brauckhoff, K. Salamatian, and M. May. Applying PCA for traffic anomaly detection: Problems and solutions. In Infocom, 2009.
-
(2009)
Infocom
-
-
Brauckhoff, D.1
Salamatian, K.2
May, M.3
-
5
-
-
66549111364
-
Automating network application dependency discovery: Experiences, limitations, and new solutions
-
X. Chen, M. Zhang, Z. M. Mao, and P. Bahl. Automating network application dependency discovery: Experiences, limitations, and new solutions. In OSDI, 2008.
-
(2008)
OSDI
-
-
Chen, X.1
Zhang, M.2
Mao, Z.M.3
Bahl, P.4
-
7
-
-
18744376591
-
High breakdown estimators for principal components: The projection-pursuit approach revisited
-
C. Croux and A. Ruiz-Gazen. High breakdown estimators for principal components: the projection-pursuit approach revisited. J. Multivariate Analysis, 2005.
-
(2005)
J. Multivariate Analysis
-
-
Croux, C.1
Ruiz-Gazen, A.2
-
9
-
-
78650894357
-
Basisdetect: A model-based network event detection framework
-
B. Eriksson, P. Barford, R. Bowden, N. Duffield, J. Sommers, and M. Roughan. Basisdetect: a model-based network event detection framework. In IMC, 2010.
-
(2010)
IMC
-
-
Eriksson, B.1
Barford, P.2
Bowden, R.3
Duffield, N.4
Sommers, J.5
Roughan, M.6
-
13
-
-
29244432177
-
Shrink: A tool for failure diagnosis in IP networks
-
S. Kandula, D. Katabi, and J.-P. Vasseur. Shrink: A tool for failure diagnosis in IP networks. In MineNet, 2005.
-
(2005)
MineNet
-
-
Kandula, S.1
Katabi, D.2
Vasseur, J.-P.3
-
14
-
-
77952197862
-
Detailed diagnosis in enterprise networks
-
S. Kandula, R. Mahajan, P. Verkaik, S. Agarwal, J. Padhye, and P. Bahl. Detailed diagnosis in enterprise networks. In Sigcomm, 2009.
-
(2009)
Sigcomm
-
-
Kandula, S.1
Mahajan, R.2
Verkaik, P.3
Agarwal, S.4
Padhye, J.5
Bahl, P.6
-
17
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. In Sigcomm, 2005.
-
(2005)
Sigcomm
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
18
-
-
34248368977
-
Minerals: Using data mining to detect router misconfigurations
-
F. Le, S. Lee, T.Wong, H. S. Kim, and D. Newcomb. Minerals: using data mining to detect router misconfigurations. In MineNet, 2006.
-
(2006)
MineNet
-
-
Le, F.1
Lee, S.2
Wong, T.3
Kim, H.S.4
Newcomb, D.5
-
19
-
-
77955690054
-
The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices
-
Z. Lin, M. Chen, L. Wu, and Y. Ma. The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. UIUC Tech. Report UILU-ENG-09-2215, 2009.
-
(2009)
UIUC Tech. Report UILU-ENG-09-2215
-
-
Lin, Z.1
Chen, M.2
Wu, L.3
Ma, Y.4
-
20
-
-
78650904433
-
Towards automated performance diagnosis in a large IPTV network
-
A. Mahimkar, Z. Ge, A. Shaikh, J. Wang, J. Yates, Y. Zhang, and Q. Zhao. Towards automated performance diagnosis in a large IPTV network. In Sigcomm, 2009.
-
(2009)
Sigcomm
-
-
Mahimkar, A.1
Ge, Z.2
Shaikh, A.3
Wang, J.4
Yates, J.5
Zhang, Y.6
Zhao, Q.7
-
21
-
-
78149350182
-
Detecting the performance impact of upgrades in large operational networks
-
A. Mahimkar, H. H. Song, Z. Ge, A. Shaikh, J.Wang, J. Yates, Y. Zhang, and J. Emmons. Detecting the performance impact of upgrades in large operational networks. In ACM SIGCOMM, 2010.
-
(2010)
ACM SIGCOMM
-
-
Mahimkar, A.1
Song, H.H.2
Ge, Z.3
Shaikh, A.4
Wang, J.5
Yates, J.6
Zhang, Y.7
Emmons, J.8
-
22
-
-
70350747452
-
Troubleshooting chronic conditions in large IP networks
-
A. Mahimkar, J. Yates, Y. Zhang, A. Shaikh, J. Wang, Z. Ge, and C. T. Ee. Troubleshooting chronic conditions in large IP networks. In CoNEXT, 2008.
-
(2008)
CoNEXT
-
-
Mahimkar, A.1
Yates, J.2
Zhang, Y.3
Shaikh, A.4
Wang, J.5
Ge, Z.6
Ee, C.T.7
-
24
-
-
84862961126
-
-
Mark The Spot. http://itunes.apple.com/us/app/at-t-mark-the-spot/ id338307313?mt=8.
-
Mark the Spot
-
-
-
25
-
-
84862946664
-
-
Ibm Tivoli Netcool. http://www.-01.ibm.com/software/tivoli/products/ netcool-omnibus/.
-
Ibm Tivoli Netcool
-
-
-
26
-
-
78650865351
-
Listen to me if you can: Tracking user experience of mobile network on social media
-
T. Qiu, J. Feng, Z. Ge, J. Wang, J. Xu, and J. Yates. Listen to me if you can: tracking user experience of mobile network on social media. In IMC, 2010.
-
(2010)
IMC
-
-
Qiu, T.1
Feng, J.2
Ge, Z.3
Wang, J.4
Xu, J.5
Yates, J.6
-
28
-
-
84877775237
-
ANTIDOTE: Understanding and defending against poisoning of anomaly detectors
-
B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-h. Lau, S. Rao, N. Taft, and J. D. Tygar. ANTIDOTE: understanding and defending against poisoning of anomaly detectors. In IMC, 2009.
-
(2009)
IMC
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
29
-
-
77953306333
-
URCA: Pulling out anomalies by their root causes
-
F. Silveira and C. Diot. URCA: Pulling out anomalies by their root causes. In INFOCOM, 2010.
-
(2010)
INFOCOM
-
-
Silveira, F.1
Diot, C.2
-
30
-
-
78149299461
-
ASTUTE: Detecting a different class of traffic anomalies
-
F. Silveira, C. Diot, N. Taft, and R. Govindan. ASTUTE: Detecting a different class of traffic anomalies. In SIGCOMM, 2010.
-
(2010)
SIGCOMM
-
-
Silveira, F.1
Diot, C.2
Taft, N.3
Govindan, R.4
-
31
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
A. Soule, K. Salamatian, and N. Taft. Combining filtering and statistical methods for anomaly detection. In IMC, 2005.
-
(2005)
IMC
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
32
-
-
79952039442
-
Answering what-if deployment and configuration questions with WISE
-
M. Tariq, A. Zeitoun, V. Valancius, N. Feamster, and M. Ammar. Answering what-if deployment and configuration questions with WISE. In Sigcomm, 2008.
-
(2008)
Sigcomm
-
-
Tariq, M.1
Zeitoun, A.2
Valancius, V.3
Feamster, N.4
Ammar, M.5
-
34
-
-
84863367863
-
Robust principal component analysis: Exact recovery of corrupted low-rank matrices via convex optimization
-
J. Wright, A. Ganesh, S. Rao, Y. Peng, and Y. Ma. Robust principal component analysis: Exact recovery of corrupted low-rank matrices via convex optimization. In Neural Information Processing Systems (NIPS), 2009.
-
(2009)
Neural Information Processing Systems (NIPS)
-
-
Wright, J.1
Ganesh, A.2
Rao, S.3
Peng, Y.4
Ma, Y.5
-
36
-
-
78649291505
-
Spatio-temporal compressive sensing and internet traffic matrices
-
Y. Zhang, M. Roughan, W. Willinger, and L. Qiu. Spatio-temporal compressive sensing and internet traffic matrices. In Sigcomm, 2009.
-
(2009)
Sigcomm
-
-
Zhang, Y.1
Roughan, M.2
Willinger, W.3
Qiu, L.4
|