-
1
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
6-8 November, Marseille, France
-
Barford, P., J. Kline, D. Plonka, and, A. Ron, (2002) A signal analysis of network traffic anomalies, ACM SIGCOMM InternetMeasurement Workshop 2002, 6-8 November, Marseille, France.
-
(2002)
ACM SIGCOMM InternetMeasurement Workshop 2002
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
2
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
17-21 November, Taipei, Taiwan, R.O.C
-
Cheng, C.M., H.T. Kung, and, K.S. Tan, (2002) Use of spectral analysis in defense against DoS attacks, IEEE GLOBECOM, 17-21 November, Taipei, Taiwan, R.O.C., pp. 2143-2148.
-
(2002)
IEEE GLOBECOM
, pp. 2143-2148
-
-
Cheng, C.M.1
Kung, H.T.2
Tan, K.S.3
-
3
-
-
70449632946
-
Exploiting diversity and correlation to improve the performance of intrusion detection systems
-
24-26 June, Paris, France
-
Coppolino, L., L. D'Antonio, M. Esposito, and, L. Romano, (2009) Exploiting diversity and correlation to improve the performance of intrusion detection systems, in Proceedings of IFIP/IEEE International Conference on Network and Service, 24-26 June, Paris, France.
-
(2009)
Proceedings of IFIP/IEEE International Conference on Network and Service
-
-
Coppolino, L.1
D'Antonio, L.2
Esposito, M.3
Romano, L.4
-
4
-
-
50949130514
-
Wavelet-based detection of DoS attacks
-
27 November-1 December, San Francisco, CA, USA
-
Dainotti, A., A. Pescape, and, G. Ventre, (2006) Wavelet-based detection of DoS attacks, IEEE GLOBECOM, 27 November-1 December, San Francisco, CA, USA.
-
(2006)
IEEE GLOBECOM
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
5
-
-
38549112565
-
Worm traffic analysis and characterization
-
24-28 June 2007, Glasgow, Scotland
-
Dainotti, A., A. Pescape, and, A. Ventre, (2007) Worm traffic analysis and characterization, Proceedings of the IEEE International Conference on Communications 2007- ICC 2007, 24-28 June 2007, Glasgow, Scotland, pp. 1435-1442.
-
(2007)
Proceedings of the IEEE International Conference on Communications 2007- ICC 2007
, pp. 1435-1442
-
-
Dainotti, A.1
Pescape, A.2
Ventre, A.3
-
6
-
-
85032769578
-
Audio sparse decompositions in parallel
-
Daudet, L., (2010) Audio sparse decompositions in parallel, IEEE Signal Processing Magazine, 27, 90-96.
-
(2010)
IEEE Signal Processing Magazine
, vol.27
, pp. 90-96
-
-
Daudet, L.1
-
7
-
-
0003993827
-
-
Defense Advanced Research Projects Agency (DARPA) (accessed December 2010)
-
Defense Advanced Research Projects Agency (DARPA), Intrusion Detection Evaluation Data Set. Available at (accessed December 2010).
-
Intrusion Detection Evaluation Data Set
-
-
-
8
-
-
78650753809
-
Evaluating pattern recognition techniques in intrusion detection systems
-
24-25 May, Miami, FL, USA
-
Esposito, M., C. Mazzariello, F. Oliviero, S.P. Romano, and, C. Sansone, (2005a) Evaluating pattern recognition techniques in intrusion detection systems, Proceedings of the 5th Workshop on Pattern Recognition in Information Systems (PRIS '05), 24-25 May, Miami, FL, USA, pp. 144-153.
-
(2005)
Proceedings of the 5th Workshop on Pattern Recognition in Information Systems (PRIS '05)
, pp. 144-153
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.P.4
Sansone, C.5
-
9
-
-
27244454402
-
Real time detection of novel attacks by means of data mining techniques
-
24-28 May, Miami
-
Esposito, M., C. Mazzariello, F. Oliviero, S.P. Romano, and, C. Sansone, (2005b) Real time detection of novel attacks by means of data mining techniques, Proceedings of the 7th International Conference on Enterprise Information Systems, 24-28 May, Miami, pp. 120-127.
-
(2005)
Proceedings of the 7th International Conference on Enterprise Information Systems
, pp. 120-127
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.P.4
Sansone, C.5
-
10
-
-
32944466885
-
Low-rate and flexible image coding with redundant representations
-
Figueras, R.M., P. Vandergheynst, and, P. Frossard, (2006) Low-rate and flexible image coding with redundant representations, IEEE Transactions on Image Processing, 15, 726-739.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, pp. 726-739
-
-
Figueras, R.M.1
Vandergheynst, P.2
Frossard, P.3
-
11
-
-
0002843657
-
Decompositions of functions into wavelets of constant shape, and related transforms, mathematics and physics: Lectures an recent results
-
L. Streit (ed.), Singapore: World Scientific
-
Grossman, A., and, J. Morlet, (1985) Decompositions of functions into wavelets of constant shape, and related transforms, mathematics and physics: lectures an recent results, in Mathematics and Physics Lectures on Recent Results, L. Streit (ed.), Singapore: World Scientific, 135-165.
-
(1985)
Mathematics and Physics Lectures on Recent Results
, pp. 135-165
-
-
Grossman, A.1
Morlet, J.2
-
12
-
-
0003254064
-
A non-intrusive, wavelet-based approach to detecting network performance problems
-
27-31 August 2001, San Diego, CA
-
Huang, P., A. Feldmann, and, W. Willinger, (2001) A non-intrusive, wavelet-based approach to detecting network performance problems, ACM SIGCOMM Internet Measurement Workshop, 27-31 August 2001, San Diego, CA.
-
(2001)
ACM SIGCOMM Internet Measurement Workshop
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
13
-
-
84863717888
-
Tree-based pursuit: Algorithm and properties. Swiss Federal Institute of Technology Lausanne (EPFL)
-
17 May
-
Jost, P., P. Vandergheynst, and, P. Frossard, (2005) Tree-based pursuit: algorithm and properties. Swiss Federal Institute of Technology Lausanne (EPFL), Signal Processing Institute Technical Report, TR-ITS-2005.013, 17 May.
-
(2005)
Signal Processing Institute Technical Report, TR-ITS-2005.013
-
-
Jost, P.1
Vandergheynst, P.2
Frossard, P.3
-
14
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
25-27 October, Taormina, Sicily, Italy
-
Lakhina, A., M. Crovella, and, CH. Diot, (2004) Characterization of network-wide anomalies in traffic flows, Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004, 25-27 October, Taormina, Sicily, Italy, pp. 201-206.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.H.3
-
15
-
-
84952326439
-
DDos attack detection and wavelets
-
20-22 October 2003, Dallas, TX
-
Li, L., and, G. Lee, (2003) DDos attack detection and wavelets, International Conference on Computer Communications and Networks IEEE (ICCCN'03), 20-22 October 2003, Dallas, TX, pp. 421-427.
-
(2003)
International Conference on Computer Communications and Networks IEEE (ICCCN'03)
, pp. 421-427
-
-
Li, L.1
Lee, G.2
-
16
-
-
59949095579
-
Network anomaly detection based on wavelet analysis
-
doi: 10.1155/2009/837601
-
Lu, W., and, A.A. Ghorbani, (2009) Network anomaly detection based on wavelet analysis, EURASIP Journal on Advances in Signal Processing, 2009, doi: 10.1155/2009/837601.
-
(2009)
EURASIP Journal on Advances in Signal Processing
, vol.2009
-
-
Lu, W.1
Ghorbani, A.A.2
-
17
-
-
0027842081
-
Matching Pursuit with time-frequency dictionaries
-
Mallat, S., and, Z. Zhang, (1993) Matching Pursuit with time-frequency dictionaries, IEEE Transactions on Signal Processing, 41, 3397-3415.
-
(1993)
IEEE Transactions on Signal Processing
, vol.41
, pp. 3397-3415
-
-
Mallat, S.1
Zhang, Z.2
-
18
-
-
0036214290
-
Matching Pursuit video coding - Part I: Dictionary approximation
-
Neff, R., and, A. Zakhor, (2002) Matching Pursuit video coding-part I: dictionary approximation, IEEE Transactions on Circuits and Systems for Video Technology, 12, 13-26.
-
(2002)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.12
, pp. 13-26
-
-
Neff, R.1
Zakhor, A.2
-
19
-
-
78650728514
-
A novel signal-based approach to anomaly detection in IDS systems
-
ICANNGA 2009 M. Kolehmainen, P. Toivanen and B. Beliczynski (eds), Berlin: Springer
-
Saganowski, L., M. Chorał, R. Renk, and, W. Holubowicz, (2009) A novel signal-based approach to anomaly detection in IDS systems, in ICANNGA 2009, LNCS 5495, M. Kolehmainen, P. Toivanen, and, B. Beliczynski, (eds), Berlin: Springer, 527-536.
-
(2009)
LNCS 5495
, pp. 527-536
-
-
Saganowski, L.1
Choraś, M.2
Renk, R.3
Holubowicz, W.4
-
20
-
-
84969667654
-
A low bit-rate audio coder based on modified sinusoidal model
-
29 June-1 July, Chengdu, China, 1, 648-652, July
-
Shaopeng, S., Y. Junxun, Y. Yongcong, and, A.M. Raed, (2002), A low bit-rate audio coder based on modified sinusoidal model, IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions Proceedings, 29 June-1 July, Chengdu, China, Vol. 1, pp. 648-652, July.
-
(2002)
IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions Proceedings
-
-
Shaopeng, S.1
Junxun, Y.2
Yongcong, Y.3
Raed, A.M.4
-
22
-
-
5444237123
-
Greed is good: Algorithmic results for sparse approximation
-
Troop, J.A., (2004) Greed is good: algorithmic results for sparse approximation, IEEE Transactions on Information Theory, 50, 2231-2242.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, pp. 2231-2242
-
-
Troop, J.A.1
-
23
-
-
84863717455
-
-
Universita' di Napoli (UNINA) Available at (accessed December 2010)
-
Universita' di Napoli (UNINA) Available at (accessed December 2010).
-
-
-
-
24
-
-
84863723612
-
-
WIDE Project: MAWI Working Group Traffic Archive. Available at (accessed December 2010)
-
WIDE Project: MAWI Working Group Traffic Archive. Available at (accessed December 2010).
-
-
-
-
25
-
-
0003254080
-
Chi-squared statistical profiling for anomaly detection
-
6-7 June, West Point, NY
-
Ye, N., Q. Chen, and, S.M. Emran, (2000), Chi-squared statistical profiling for anomaly detection, in Proceedings of the IEEE SMC Inform. Assurance Security Workshop, 6-7 June, West Point, NY, pp. 182-188.
-
(2000)
Proceedings of the IEEE SMC Inform. Assurance Security Workshop
, pp. 182-188
-
-
Ye, N.1
Chen, Q.2
Emran, S.M.3
|