-
2
-
-
84875943831
-
-
data
-
Kdd cup (1999), data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
-
(1999)
Kdd cup
-
-
-
4
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
IMW 2002 ACM New York
-
Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, IMW 2002, pp. 71-82. ACM, New York (2002
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
5
-
-
70349684725
-
Seven years and one day: Sketching the evolution of internet traffic
-
April
-
Borgnat, P., Dewaele, G., Fukuda, K., Abry, P., Cho, K.: Seven years and one day: Sketching the evolution of internet traffic. In: INFOCOM (April 2009
-
(2009)
INFOCOM
-
-
Borgnat, P.1
Dewaele, G.2
Fukuda, K.3
Abry, P.4
Cho, K.5
-
6
-
-
62849107731
-
Efficient intrusion detection using principal component analysis
-
La Londe, France, Juin, RSM-D'ept. R'eseaux, S'ecurit'e et Multim'edia (Institut T'el'ecom-T'el'ecom Bretagne
-
Bouzida, Y., Cuppens, F., Cuppens-Boulahia, N.A., Gombault, S.N.: Efficient intrusion detection using principal component analysis. In: 3̀eme Conf'erence sur la S'ecurit'e et Architectures R'eseaux, La Londe, France, Juin, RSM-D'ept. R'eseaux, S'ecurit'e et Multim'edia (Institut T'el'ecom-T'el'ecom Bretagne) (2004
-
(2004)
3Eme Conf'erence sur la S'ecurit'e et Architectures R'eseaux
-
-
Bouzida, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.A.3
Gombault, S.N.4
-
7
-
-
0039253819
-
Lof: Identifying density-based local outliers
-
Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: Lof: Identifying density-based local outliers. ACM SIGMOD Record 29(2), 93-104 (2000
-
(2000)
ACM SIGMOD Record
, vol.29
, Issue.2
, pp. 93-104
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
9
-
-
77950566663
-
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
-
IEEE Press Piscataway
-
Brown, C., Cowperthwaite, A., Hijazi, A., Somayaji, A.: Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict. In: CISDA 2009: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, pp. 67-73. IEEE Press, Piscataway (2009
-
(2009)
CISDA 2009: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications
, pp. 67-73
-
-
Brown, C.1
Cowperthwaite, A.2
Hijazi, A.3
Somayaji, A.4
-
11
-
-
0242572726
-
Measuring system normality
-
Burgess, M., Haugerud, H., Straumsnes, S., Reitan, T.: Measuring system normality. ACM Trans. Comput. Syst. 20(2), 125-160 (2002
-
(2002)
ACM Trans. Comput. Syst
, vol.20
, Issue.2
, pp. 125-160
-
-
Burgess, M.1
Haugerud, H.2
Straumsnes, S.3
Reitan, T.4
-
12
-
-
78649292799
-
A novel multi time-scales pca-based anomaly detection system
-
SPECTS
-
Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M., Pepe, T.: A novel multi time-scales pca-based anomaly detection system. In: 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS (2010
-
(2010)
2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems
-
-
Callegari, C.1
Gazzarrini, L.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
-
13
-
-
79952025940
-
When randomness improves the anomaly detection performance
-
ISABEL
-
Callegari, C., Gazzarrini, L., Giordano, S., Pagano, M., Pepe, T.: When randomness improves the anomaly detection performance. In: Proceedings of 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL (2010
-
(2010)
Proceedings of 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies
-
-
Callegari, C.1
Gazzarrini, L.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
-
14
-
-
51849117294
-
Application of wavelet packet transform to network anomaly detection
-
Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds. Springer, Heidelberg
-
Callegari, C., Giordano, S., Pagano, M.: Application of Wavelet Packet Transform to Network Anomaly Detection. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds.) NEW2AN 2008. LNCS, vol. 5174, pp. 246-257. Springer, Heidelberg (2008
-
(2008)
NEW2AN 2008. LNCS
, vol.5174
, pp. 246-257
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
-
15
-
-
77955131278
-
On the use of sketches and wavelet analysis for network anomaly detection
-
ACM, New York
-
Callegari, C., Giordano, S., Pagano, M., Pepe, T.: On the use of sketches and wavelet analysis for network anomaly detection. In: IWCMC 2010: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, pp. 331-335. ACM, New York (2010
-
(2010)
IWCMC 2010: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
, pp. 331-335
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
Pepe, T.4
-
16
-
-
80955142776
-
Combining sketches and wavelet analysis for multi time-scale network anomaly detection
-
Callegari, C., Giordano, S., Pagano, M., Pepe, T.: Combining sketches and wavelet analysis for multi time-scale network anomaly detection. Computers & Security 30(8), 692-704 (2011
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 692-704
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
Pepe, T.4
-
17
-
-
80052448261
-
Detecting heavy change in the heavy hitter distribution of network traffic
-
IEEE Press
-
Callegari, C., Giordano, S., Pagano, M., Pepe, T.: Detecting heavy change in the heavy hitter distribution of network traffic. In: IWCMC, pp. 1298-1303. IEEE Press (2011
-
(2011)
IWCMC
, pp. 1298-1303
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
Pepe, T.4
-
18
-
-
84861919350
-
Detecting anomalies in backbone network traffic: A performance comparison among several change detection methods
-
Callegari, C., Giordano, S., Pagano, M., Pepe, T.: Detecting anomalies in backbone network traffic: A performance comparison among several change detection methods. IJSNet 11(4), 205-214 (2012
-
(2012)
IJSNet
, vol.11
, Issue.4
, pp. 205-214
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
Pepe, T.4
-
19
-
-
33751110003
-
Wavelet based denial-of-service detection
-
Carl, G., Brooks, R.R., Rai, S.: Wavelet based denial-of-service detection. Computers & Security 25(8), 600-615 (2006
-
(2006)
Computers & Security
, vol.25
, Issue.8
, pp. 600-615
-
-
Carl, G.1
Brooks, R.R.2
Rai, S.3
-
20
-
-
68049121093
-
Anomaly detection: A survey
-
58
-
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3), 15:1-15:58 (2009
-
(2009)
ACM Comput. Surv
, vol.41
, Issue.3
, pp. 151-115
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
21
-
-
84869158135
-
Finding frequent items in data streams
-
Charikar,M., Chen, K., Farach-Colton, M.: Finding frequent items in data streams. In: Proc. VLDB Endow, pp. 693-703 (2002
-
(2002)
Proc. VLDB Endow
, pp. 693-703
-
-
Charikar, M.1
Chen, K.2
Farach-Colton, M.3
-
22
-
-
67949109641
-
Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (m3l) pca-based approach
-
Chatzigiannakis, V., Papavassiliou, S., Androulidakis, G.: Improving network anomaly detection effectiveness via an integrated multi-metric-multi- link (m3l) pca-based approach. Security and Communication Networks 2(3), 289-304 (2009
-
(2009)
Security and Communication Networks
, vol.2
, Issue.3
, pp. 289-304
-
-
Chatzigiannakis, V.1
Papavassiliou, S.2
Androulidakis, G.3
-
23
-
-
0031515592
-
Testing and locating variance change points with application to stock prices
-
Chen, J., Gupta, A.: Testing and locating variance change points with application to stock prices. J. Am. Statist. Assoc. 92, 739-747 (1997
-
(1997)
J. Am. Statist. Assoc
, vol.92
, pp. 739-747
-
-
Chen, J.1
Gupta, A.2
-
24
-
-
80052484849
-
Finding hierarchical heavy hitters with the count min sketch
-
Simulation, Monitoring and Measurement, IPS-MOME
-
Cheung-Mon-Chan, P., Clerot, F.: Finding hierarchical heavy hitters with the count min sketch. In: Proceedings of 4th InternationalWorkshop on Internet Performance, Simulation, Monitoring and Measurement, IPS-MOME (2006
-
(2006)
Proceedings of 4th InternationalWorkshop on Internet Performance
-
-
Cheung-Mon-Chan, P.1
Clerot, F.2
-
27
-
-
8344272783
-
What's new: Finding significant differences in network data streams
-
Cormode, G., Muthukrishnan, S.: What's new: Finding significant differences in network data streams. In: Proc. of IEEE Infocom, pp. 1534-1545 (2004
-
(2004)
Proc. of IEEE Infocom
, pp. 1534-1545
-
-
Cormode, G.1
Muthukrishnan, S.2
-
28
-
-
14844367057
-
An improved data stream summary: The count-min sketch and its applications
-
Cormode, G., Muthukrishnan, S.: An improved data stream summary: The count-min sketch and its applications. Journal of Algorithms 55(1), 58-75 (2005
-
(2005)
Journal of Algorithms
, vol.55
, Issue.1
, pp. 58-75
-
-
Cormode, G.1
Muthukrishnan, S.2
-
29
-
-
85012186650
-
Finding hierarchical heavy hitters in data streams
-
Cormode, G., Muthukrishnan, S., Srivastava, D.: Finding hierarchical heavy hitters in data streams. In: Proc. of VLDB, pp. 464-475 (2003
-
(2003)
Proc. of VLDB
, pp. 464-475
-
-
Cormode, G.1
Muthukrishnan, S.2
Srivastava, D.3
-
30
-
-
50949130514
-
Wavelet-based detection of dos attacks
-
IEEE
-
Dainotti, A., Pescape, A., Ventre, G.: Wavelet-based detection of dos attacks. In: Proceedings of Global Telecommunications Conference, GLOBECOM2006, pp. 1-6. IEEE (2006
-
(2006)
Proceedings of Global Telecommunications Conference, GLOBECOM2006
, pp. 1-6
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
31
-
-
77956384663
-
Distribution-based anomaly detection in 3g mobile networks: From theory to practice
-
D'Alconzo, A., Coluccia, A., Romirer-Maierhofer, P.: Distribution-based anomaly detection in 3g mobile networks: From theory to practice. Int. J. Netw. Manag. 20(5), 245-269 (2010
-
(2010)
Int. J. Netw. Manag
, vol.20
, Issue.5
, pp. 245-269
-
-
D'Alconzo, A.1
Coluccia, A.2
Romirer-Maierhofer, P.3
-
36
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
ACM, New York
-
Dewaele, G., Fukuda, K., Borgnat, P., Abry, P., Cho, K.: Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: LSAD 2007: Proceedings of the 2007 Workshop on Large Scale Attack Defense, pp. 145-152. ACM, New York (2007
-
(2007)
LSAD 2007: Proceedings of the 2007 Workshop on Large Scale Attack Defense
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
37
-
-
50049128484
-
Optimizing fuzzy k-means for network anomaly detection using pso
-
IEEE Computer Society Washington DC
-
Ensafi, R., Dehghanzadeh, S., Akbarzadeh, T.M.R.: Optimizing fuzzy k-means for network anomaly detection using pso. In: AICCSA 2008: Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications, pp. 686-693. IEEE Computer Society, Washington, DC (2008
-
(2008)
AICCSA 2008: Proceedings of the 2008 IEEE/ ACS International Conference on Computer Systems and Applications
, pp. 686-693
-
-
Ensafi, R.1
Dehghanzadeh, S.2
Akbarzadeh, T.M.R.3
-
38
-
-
24944527971
-
-
MIT Press
-
Ertöz, L., Eilertson, E., Lazarevic, A., Tan, P.N., Kumar, V., Srivastava, J.P., Dokas, P.: MINDS-Minnesota Intrusion Detection System. MIT Press (2004
-
(2004)
MINDS-Minnesota Intrusion Detection System
-
-
Ertöz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.N.4
Kumar, V.5
Srivastava, J.P.6
Dokas, P.7
-
39
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Kluwer
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security. Kluwer (2002
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
40
-
-
2442583610
-
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
-
Estan, C., Varghese, G.: New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice. ACM Transactions on Computer Systems 21, 270-313 (2003
-
(2003)
ACM Transactions on Computer Systems
, vol.21
, pp. 270-313
-
-
Estan, C.1
Varghese, G.2
-
41
-
-
85170282443
-
-
AAAI Press
-
Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226-231. AAAI Press (1996
-
(1996)
A Density-Based Algorithm For Discovering Clusters In Large Spatial Databases With Noise
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
42
-
-
0012292276
-
A neural network approach towards intrusion detection
-
Fox, K.L., Henning, R.R., Reed, J.H., Simonian, R.P.: A neural network approach towards intrusion detection. In: Proc. 13th National Computer Security Conference. Information Systems Security. Standards-The Key to the Future, vol. I, pp. 124-134 (1990
-
(1990)
Proc. 13th National Computer Security Conference. Information Systems Security. Standards-The Key to the Future
, vol.1
, pp. 124-134
-
-
Fox, K.L.1
Henning, R.R.2
Reed, J.H.3
Simonian, R.P.4
-
43
-
-
77956386014
-
On dominant characteristics of residential broadband internet traffic
-
Maier, G., Feldmann, A., Paxson, V., Allman,M.: On dominant characteristics of residential broadband internet traffic. In: IEEE IMC (2009
-
(2009)
IEEE IMC
-
-
Maier, G.1
Feldmann, A.2
Paxson, V.3
Allman, M.4
-
46
-
-
7544223741
-
A survey of outlier detection methodologies
-
Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85-126 (2004
-
(2004)
Artif. Intell. Rev
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.1
Austin, J.2
-
47
-
-
0000106449
-
Tests for variance shift at an unknown time point
-
Hsu, D.: Tests for variance shift at an unknown time point. Appl. Statist. 26, 279-284 (1977
-
(1977)
Appl. Statist
, vol.26
, pp. 279-284
-
-
Hsu, D.1
-
48
-
-
0003254064
-
A non-instrusive, wavelet-based approach to detecting network performance problems
-
Huang, P., Feldmann, A., Willinger, W.: A non-instrusive, wavelet-based approach to detecting network performance problems. In: IMW 2001: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 213-227 (2001
-
(2001)
IMW 2001: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
, pp. 213-227
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
49
-
-
33749848531
-
Use of cumulative sums of squares for retrospective detection of changes of variance
-
Incl'an, C., Tiao, G.: Use of cumulative sums of squares for retrospective detection of changes of variance. J. Am. Statist. Assoc. 89, 913-923 (1994
-
(1994)
J. Am. Statist. Assoc
, vol.89
, pp. 913-923
-
-
Incl'an, C.1
Tiao, G.2
-
52
-
-
45749145925
-
Detecting traffic anomalies using discrete wavelet transform
-
Busan, Korea
-
Kim, S.S.,Narasimha Reddy, A.L., Vannucci,M.: Detecting traffic anomalies using discrete wavelet transform. In: Proceedings of International Conference on Information Networking (ICOIN), Busan, Korea, pp. 1375-1384 (2003
-
(2003)
Proceedings of International Conference on Information Networking (ICOIN
, pp. 1375-1384
-
-
Kim, S.S.1
Narasimha Reddy, A.L.2
Vannucci, M.3
-
53
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Lakhina, A.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM, pp. 219-230 (2004
-
(2004)
ACM SIGCOMM
, pp. 219-230
-
-
Lakhina, A.1
-
54
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
Lakhina, A., Crovella, M., Diot, C.: Characterization of network-wide anomalies in traffic flows. In: ACM Internet Measurement Conference, pp. 201-206 (2004
-
(2004)
ACM Internet Measurement Conference
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
55
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM SIGCOMM (2005
-
(2005)
ACM SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
56
-
-
8344255864
-
Structural analysis of network traffic flows
-
ACM, New York
-
Lakhina, A., Papagiannaki, K., Crovella, M., Christophe, D., Kolaczyk, E.D., Taft, N.: Structural analysis of network traffic flows. In: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2004/Performance 2004, pp. 61-72. ACM, New York (2004
-
(2004)
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2004/Performance 2004
, pp. 61-72
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Christophe, D.4
Kolaczyk, E.D.5
Taft, N.6
-
57
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ozgur, A., Ertoz, L., Srivastava, J., Kumar, V.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the Third SIAM International Conference on Data Mining (2003
-
(2003)
Proceedings of the Third SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
58
-
-
0028377540
-
On the self-similar nature of ethernet traffic (extended version
-
Leland, W.E., Taqqu, M.S., Willinger, W., Wilson, D.V.: On the self-similar nature of ethernet traffic (extended version). IEEE/ACMTrans. Netw. 2(1), 1-15 (1994
-
(1994)
IEEE/ ACMTrans. Netw
, vol.2
, Issue.1
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
Wilson, D.V.4
-
61
-
-
0001524507
-
Procedures for reacting to a change in distribution
-
Lorden, G.: Procedures for reacting to a change in distribution. Ann. Math. Statist. 42, 1897-1908 (1971
-
(1971)
Ann. Math. Statist
, vol.42
, pp. 1897-1908
-
-
Lorden, G.1
-
63
-
-
0024700097
-
A theory for multiresolution signal decomposition: The wavelet representation
-
Mallat, S.G.: A theory for multiresolution signal decomposition: The wavelet representation. IEEE Transactions on Pattern Analysis and Machine Intelligence 11(7), 674-693 (1989
-
(1989)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.11
, Issue.7
, pp. 674-693
-
-
Mallat, S.G.1
-
65
-
-
79955578061
-
M/g/∞transience, and its applications to overload detection
-
Mandjes, M., Zuraniewski, P.:M/g/∞transience, and its applications to overload detection. Performance Evaluation 68, 507-527 (2011
-
(2011)
Performance Evaluation
, vol.68
, pp. 507-527
-
-
Mandjes, M.1
Zuraniewski, P.2
-
66
-
-
2442443820
-
Approximate frequency counts over data streams
-
Manku, G.S., Motwani, R.: Approximate frequency counts over data streams. In: VLDB, pp. 346-357 (2002
-
(2002)
VLDB
, pp. 346-357
-
-
Manku, G.S.1
Motwani, R.2
-
67
-
-
84869465627
-
Anomaly detection in voip traffic with trends
-
Mata, F., Zuraniewski, P., Mandjes, M., Mellia, M.: Anomaly detection in voip traffic with trends. In: Proceedings of the 24th International Teletraffic Congress (2012
-
(2012)
Proceedings of the 24th International Teletraffic Congress
-
-
Mata, F.1
Zuraniewski, P.2
Mandjes, M.3
Mellia, M.4
-
68
-
-
77955682014
-
A tutorial overview of anomaly detection in hyperspectral images
-
Matteoli, S., Diani, M., Corsini, G.: A tutorial overview of anomaly detection in hyperspectral images. IEEE Aerospace and Electronic Systems Magazine 25(7), 5-28 (2010
-
(2010)
IEEE Aerospace and Electronic Systems Magazine
, vol.25
, Issue.7
, pp. 5-28
-
-
Matteoli, S.1
Diani, M.2
Corsini, G.3
-
71
-
-
1842539182
-
Data streams: Algorithms and applications
-
Society for Industrial and Applied Mathematics Philadelphia
-
Muthukrishnan, S.: Data streams: Algorithms and applications. In: Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 413-413. Society for Industrial and Applied Mathematics, Philadelphia (2003
-
(2003)
Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 413-413
-
-
Muthukrishnan, S.1
-
72
-
-
7444268118
-
Adaptive clustering for network intrusion detection
-
Dai, H., Srikant, R., Zhang, C. (eds. Springer, Heidelberg
-
Oldmeadow, J., Ravinutala, S., Leckie, C.: Adaptive Clustering for Network Intrusion Detection. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol. 3056, pp. 255-259. Springer, Heidelberg (2004
-
(2004)
PAKDD 2004. LNCS (LNAI
, vol.3056
, pp. 255-259
-
-
Oldmeadow, J.1
Ravinutala, S.2
Leckie, C.3
-
73
-
-
0002916530
-
Continuous inspection scheme
-
Page, E.: Continuous inspection scheme. Biometrika 41, 100-115 (1954
-
(1954)
Biometrika
, vol.41
, pp. 100-115
-
-
Page, E.1
-
74
-
-
0000783098
-
Optimal detection of a change in distribution
-
Pollak, M.: Optimal detection of a change in distribution. Ann. Statist. 13, 206-227 (1985
-
(1985)
Ann. Statist
, vol.13
, pp. 206-227
-
-
Pollak, M.1
-
77
-
-
0039845384
-
Efficient algorithms for mining outliers from large data sets
-
Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. SIGMOD Rec. 29(2), 427-438 (2000
-
(2000)
SIGMOD Rec
, vol.29
, Issue.2
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
79
-
-
77951552261
-
On the role of flows and sessions in internet traffic modeling: An explorative toy-model
-
Ricciato, F., Coluccia, A., D'Alconzo, A., Veitch, D., Borgnat, P., Abry, P.: On the role of flows and sessions in internet traffic modeling: An explorative toy-model. In: IEEE Globecom (2009
-
(2009)
IEEE Globecom
-
-
Ricciato, F.1
Coluccia, A.2
D'Alconzo, A.3
Veitch, D.4
Borgnat, P.5
Abry, P.6
-
80
-
-
74849109011
-
A review of dos attack models for 3g cellular networks from a system-design perspective
-
Ricciato, F., Coluccia, A., D'Alconzo, A.: A review of dos attack models for 3g cellular networks from a system-design perspective. Computer Communications 33(5), 551-558 (2010
-
(2010)
Computer Communications
, vol.33
, Issue.5
, pp. 551-558
-
-
Ricciato, F.1
Coluccia, A.2
D'Alconzo, A.3
-
81
-
-
36349029177
-
Sensitivity of pca for traffic anomaly detection
-
Ringberg, H., Soule, A., Rexford, J., Diot, C.: Sensitivity of pca for traffic anomaly detection. SIGMETRICS Perform. Eval. Rev. 35(1), 109-120 (2007
-
(2007)
SIGMETRICS Perform. Eval. Rev
, vol.35
, Issue.1
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
82
-
-
0034239268
-
Real-Time estimation of the parameters of long-range dependence
-
Roughan, M., Veitch, D., Abry, P.: Real-Time estimation of the parameters of long-range dependence. IEEE/ACM Trans. Netw. 8(4), 467-478 (2000
-
(2000)
IEEE/ACM Trans. Netw
, vol.8
, Issue.4
, pp. 467-478
-
-
Roughan, M.1
Veitch, D.2
Abry, P.3
-
83
-
-
14944385135
-
Reversible sketches for efficient and accurate change detection over network data streams
-
IMC 2004 ACM, New York
-
Schweller, R., Gupta, A., Parsons, E., Chen, Y.: Reversible sketches for efficient and accurate change detection over network data streams. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, IMC 2004, pp. 207-212. ACM, New York (2004
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 207-212
-
-
Schweller, R.1
Gupta, A.2
Parsons, E.3
Chen, Y.4
-
84
-
-
0002196122
-
On optimum methods in quickest detection problems
-
Shiryaev, A.: On optimum methods in quickest detection problems. Theory Probab. Appl. 8, 22-46 (1963
-
(1963)
Theory Probab. Appl
, vol.8
, pp. 22-46
-
-
Shiryaev, A.1
-
85
-
-
11644287656
-
On Markov sufficient statistics in non-Additive Bayes problems of sequential analysis
-
Shiryaev, A.: On Markov sufficient statistics in non-Additive Bayes problems of sequential analysis. Theory Probab. Appl. 9, 604-618 (1964
-
(1964)
Theory Probab. Appl
, vol.9
, pp. 604-618
-
-
Shiryaev, A.1
-
87
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
in Conjunction with ICDM 2003
-
Shyu, M., Chen, S., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. In: In IEEE Foundations and New Directions of Data Mining Workshop, in Conjunction with ICDM 2003, pp. 172-179 (2003
-
(2003)
IEEE Foundations and New Directions of Data Mining Workshop
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
89
-
-
84862147735
-
Autonomic parameter tuning of anomaly-based IDSs: An SSH case study
-
Sperotto, A., Mandjes, M., Sadre, R., de Boer, P.T., Pras, A.: Autonomic parameter tuning of anomaly-based IDSs: An SSH case study. IEEE Transactions on Network and Service Management 9, 128-141 (2012
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, pp. 128-141
-
-
Sperotto, A.1
Mandjes, M.2
Sadre, R.3
De Boer, P.T.4
Pras, A.5
-
90
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Subhabrata, B.K., Krishnamurthy, E., Sen, S., Zhang, Y., Chen, Y.: Sketch-based change detection: Methods, evaluation, and applications. In: Internet Measurement Conference, pp. 234-247 (2003
-
(2003)
Internet Measurement Conference
, pp. 234-247
-
-
Subhabrata, B.K.1
Krishnamurthy, E.2
Sen, S.3
Zhang, Y.4
Chen, Y.5
-
91
-
-
77951619501
-
Composition of gprs/umts traffic: Snapshots from a live network
-
IPS-MOME 2006, Salzburg
-
Svoboda, P., Ricciato, F., Hasenleithner, E., Pilz, R.: Composition of gprs/umts traffic: Snapshots from a live network. In: 4th IntlWorkshop on Internet Performance, Simulation, Monitoring and Measurement, IPS-MOME 2006, Salzburg (2006
-
(2006)
4th IntlWorkshop on Internet Performance, Simulation, Monitoring and Measurement
-
-
Svoboda, P.1
Ricciato, F.2
Hasenleithner, E.3
Pilz, R.4
-
92
-
-
33747009728
-
Changepoint detection in multi-channel and distributed systems with applications
-
Tartakovsky, A., Veeravalli, V.: Changepoint detection in multi-channel and distributed systems with applications. In: Applications of Sequential Methodologies, pp. 331-363 (2004
-
(2004)
Applications of Sequential Methodologies
, pp. 331-363
-
-
Tartakovsky, A.1
Veeravalli, V.2
-
93
-
-
1842435123
-
Tabulation based 4-universal hashing with applications to second moment estimation
-
Society for Industrial and AppliedMathematics Philadelphia
-
Thorup, M., Zhang, Y.: Tabulation based 4-universal hashing with applications to second moment estimation. In: SODA 2004: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 615-624. Society for Industrial and AppliedMathematics, Philadelphia (2004
-
(2004)
SODA 2004: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 615-624
-
-
Thorup, M.1
Zhang, Y.2
-
95
-
-
78650155254
-
Anomaly detection approaches for communication networks
-
Cormode, G., Thottan, M., Sammes, A.J. (eds. Springer, London
-
Thottan, M., Liu,G., Ji, C.: Anomaly detection approaches for communication networks. In: Cormode, G., Thottan, M., Sammes, A.J. (eds.) Algorithms for Next Generation Networks. Computer Communications and Networks, pp. 239-261. Springer, London (2010
-
(2010)
Algorithms for Next Generation Networks. Computer Communications and Networks
, pp. 239-261
-
-
Thottan M., LiuG.1
Ji, C.2
-
97
-
-
84871061297
-
On attack causality in internet-connected cellular networks
-
August
-
Traynor, P., McDaniel, P., La Porta, T.: On attack causality in internet-connected cellular networks. In: USENIX Security (August 2007
-
(2007)
USENIX Security
-
-
Traynor, P.1
McDaniel, P.2
La Porta, T.3
-
100
-
-
0039466554
-
Boundary crossing probability for Brownian motion and general boundaries
-
Wang, L., Potzelberger, K.: Boundary crossing probability for Brownian motion and general boundaries. J. Appl. Probab. 34, 54-65 (1997
-
(1997)
J. Appl. Probab
, vol.34
, pp. 54-65
-
-
Wang, L.1
Potzelberger, K.2
-
101
-
-
33750949942
-
Identifying intrusions in computer networks with principal component analysis
-
Reliability and Security IEEE Computer Society, Washington, DC
-
Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, pp. 270-279. IEEE Computer Society, Washington, DC (2006
-
(2006)
ARES 2006: Proceedings of the First International Conference on Availability
, pp. 270-279
-
-
Wang, W.1
Battiti, R.2
-
102
-
-
21144450811
-
A novel intrusion detection method based on principle component analysis in computer security
-
Yin, F.-L., Wang, J., Guo, C. (eds. Springer, Heidelberg
-
Wang, W., Guan, X., Zhang, X.: A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004, Part II. LNCS, vol. 3174, pp. 657-662. Springer, Heidelberg (2004
-
(2004)
ISNN 2004, Part II. LNCS
, vol.3174
, pp. 657-662
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
103
-
-
31344437563
-
Securing a wireless world
-
Yang, H., Ricciato, F., Lu, S., Zhang, L.: Securing a wireless world. Proceedings of the IEEE 94(2), 442-454 (2006
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 442-454
-
-
Yang, H.1
Ricciato, F.2
Lu, S.3
Zhang, L.4
|