-
3
-
-
34548613852
-
Network intrusion detection using wavelet analysis
-
Das, G., Gulati, V.P. (eds.), CIT 2004, Springer, Heidelberg
-
Rawat, S., Sastry, C.S.: Network Intrusion Detection Using Wavelet Analysis. In: Das, G., Gulati, V.P. (eds.) CIT 2004. LNCS, vol. 3356, pp. 224-232. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3356
, pp. 224-232
-
-
Rawat, S.1
Sastry, C.S.2
-
4
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
Crovella, M.E., Bestavros, A.: Self-similarity in World Wide Web traffic: Evidence and possible causes. IEEE/ACM Transactions on networking 5(6), 835-845 (1997)
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-845
-
-
Crovella, M.E.1
Bestavros, A.2
-
5
-
-
0031078972
-
Self-similarity through highvariability; Statistical analysis of Ethernet LAN traffic at the source level
-
Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-similarity through highvariability; statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking 5(1), 71-86 (1997)
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.1
, pp. 71-86
-
-
Willinger, W.1
Taqqu, M.S.2
Sherman, R.3
Wilson, D.V.4
-
6
-
-
0035246057
-
Online error detection through observation of traffic selfsimilarity
-
Schleifer, W., Mannle, M.: Online error detection through observation of traffic selfsimilarity. Proceedings of IEEE Communications 148(1), 38-42 (2001)
-
(2001)
Proceedings of IEEE Communications
, vol.148
, Issue.1
, pp. 38-42
-
-
Schleifer, W.1
Mannle, M.2
-
7
-
-
84943421730
-
On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
-
Allen, W.H., Marin, G.A.: On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems. In: Proceedings Symposium on Applications and the Internet, pp. 242-248 (2003)
-
(2003)
Proceedings Symposium on Applications and the Internet
, pp. 242-248
-
-
Allen, W.H.1
Marin, G.A.2
-
8
-
-
84964555718
-
Decision analysis of network based intrusion detection systems for denial-of-service attacks
-
Li, M., Jia, W., Zhao, W.: Decision analysis of network based intrusion detection systems for denial-of-service attacks. In: Proceedings Conferences on ICII, vol. 5, pp. 1-6 (2001)
-
(2001)
Proceedings Conferences on ICII
, vol.5
, pp. 1-6
-
-
Li, M.1
Jia, W.2
Zhao, W.3
-
9
-
-
0035402121
-
Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems
-
Nash, D.A., Ragsdale, D.: Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Transactions on Systems, Man and Cybernetics 31(4), 327-331 (2001)
-
(2001)
IEEE Transactions on Systems, Man and Cybernetics
, vol.31
, Issue.4
, pp. 327-331
-
-
Nash, D.A.1
Ragsdale, D.2
-
10
-
-
51849107998
-
Iterative windows size estimation on self-similarity measurement for network traffic anomaly detection
-
Idris, M.Y., Abdullah, A.H., Maarof, M.A.: Iterative Windows Size Estimation on Self-Similarity Measurement for Network Traffic Anomaly Detection. International Journal of Computing & Information Sciences 2(2) (2004)
-
(2004)
International Journal of Computing & Information Sciences
, vol.2
, Issue.2
-
-
Idris, M.Y.1
Abdullah, A.H.2
Maarof, M.A.3
-
11
-
-
84860141870
-
-
August 29
-
Microsoft Technet, Security Monitoring and Attack Detection (August 29, 2006), http://technet.microsoft.com/en-us/library/cc875806.aspx
-
(2006)
Security Monitoring and Attack Detection
-
-
|