-
1
-
-
36949029788
-
Towards highly reliable enterprise network services via inference of multi-level dependencies
-
P. Bahl, R.Chandra, A. Greenberg, S. Kandula, D. Maltz, and M. Zhang. Towards highly reliable enterprise network services via inference of multi-level dependencies. In Proc. SIGCOMM, 2007.
-
(2007)
Proc. SIGCOMM
-
-
Bahl, P.1
Chandra, R.2
Greenberg, A.3
Kandula, S.4
Maltz, D.5
Zhang, M.6
-
2
-
-
33845989821
-
Can machine learning be secure?
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In Proc. ASIACCS, 2006.
-
(2006)
Proc. ASIACCS
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
70349680977
-
Applying pca for traffic anomaly detection: Problems and solutions
-
D. Brauckhoff, K. Salamatian, and M. May. Applying PCA for Traffic Anomaly Detection: Problems and Solutions. In Proc. INFOCOM, 2009.
-
(2009)
Proc. INFOCOM
-
-
Brauckhoff, D.1
Salamatian, K.2
May, M.3
-
5
-
-
36949015988
-
Automating cross-layer diagnosis of enterprise wireless networks
-
Y. Cheng, M. Afanasyev, P. Verkaik, P. Benko, J. Chiang, A. Snoeren, S. Savage, and G. Voelker. Automating cross-layer diagnosis of enterprise wireless networks. In Proc. SIGCOMM, 2007.
-
(2007)
Proc. SIGCOMM
-
-
Cheng, Y.1
Afanasyev, M.2
Verkaik, P.3
Benko, P.4
Chiang, J.5
Snoeren, A.6
Savage, S.7
Voelker, G.8
-
7
-
-
18744376591
-
High breakdown estimators for principal components: The projection-pursuit approach revisited
-
C. Croux and A. Ruiz-Gazen. High breakdown estimators for principal components: the projection-pursuit approach revisited. J. Multivariate Analysis, 95(1), 2005.
-
(2005)
J. Multivariate Analysis
, vol.95
, Issue.1
-
-
Croux, C.1
Ruiz-Gazen, A.2
-
10
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
P. Fogla and W. Lee. Evading network anomaly detection systems: Formal reasoning and practical techniques. In Proc. ACM CCS, 2006.
-
(2006)
Proc. ACM CCS
-
-
Fogla, P.1
Lee, W.2
-
11
-
-
0037681087
-
Generalizing univariate signed rank statistics for testing and estimating a multivariate location parameter
-
O. Hössjer and C. Croux. Generalizing univariate signed rank statistics for testing and estimating a multivariate location parameter. J. Nonparametric Statistics, 4, 1995.
-
(1995)
J. Nonparametric Statistics
, vol.4
-
-
Hössjer, O.1
Croux, C.2
-
12
-
-
51349158726
-
In-network pca and anomaly detection
-
L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. Joseph, and N. Taft. In-network PCA and anomaly detection. In Proc. NIPS '06, 2007.
-
(2007)
Proc. NIPS '06
-
-
Huang, L.1
Nguyen, X.2
Garofalakis, M.3
Jordan, M.4
Joseph, A.5
Taft, N.6
-
13
-
-
0018503842
-
Control procedures for residuals associated with principal component analysis
-
J. E. Jackson and G. S. Mudholkar. Control procedures for residuals associated with principal component analysis. Technometrics, 21(3), 1979.
-
(1979)
Technometrics
, vol.21
, Issue.3
-
-
Jackson, J.E.1
Mudholkar, G.S.2
-
14
-
-
70849095357
-
What's going on? learning communication rules in edge networks
-
S. Kandula, R. Chandra, and D. Katabi. What's going on? learning communication rules in edge networks. In Proc. SIGCOMM, 2008.
-
(2008)
Proc. SIGCOMM
-
-
Kandula, S.1
Chandra, R.2
Katabi, D.3
-
15
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
A. Lakhina, M. Crovella, and C. Diot. Characterization of network-wide anomalies in traffic flows. In Proc. IMC, 2004.
-
(2004)
Proc. IMC
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
18
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. In Proc. SIGCOMM, 2005.
-
(2005)
Proc. SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
19
-
-
0001337027
-
Projection-pursuit approach to robust dispersion matrices and principal components: Primary theory and monte carlo
-
G. Li and Z. Chen. Projection-pursuit approach to robust dispersion matrices and principal components: primary theory and Monte Carlo. J. American Statistical Association, 80, 1985.
-
(1985)
J. American Statistical Association
, vol.80
-
-
Li, G.1
Chen, Z.2
-
20
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and identification of network anomalies using sketch subspaces. In Proc. IMC, 2006.
-
(2006)
Proc. IMC
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
21
-
-
38149021772
-
Mind: A distributed multidimensional indexing for network diagnosis
-
X. Li, F. Bian, H. Zhang, C. Diot, R. Govindan, W. Hong, and C. Iannaccone. MIND: A distributed multidimensional indexing for network diagnosis. In Proc. INFOCOM, 2006.
-
(2006)
Proc. INFOCOM
-
-
Li, X.1
Bian, F.2
Zhang, H.3
Diot, C.4
Govindan, R.5
Hong, W.6
Iannaccone, C.7
-
23
-
-
23844486772
-
Principal components and orthogonal regression based on robust scales
-
R. Maronna. Principal components and orthogonal regression based on robust scales. Technometrics, 47(3), 2005.
-
(2005)
Technometrics
, vol.47
, Issue.3
-
-
Maronna, R.1
-
24
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. Exploiting machine learning to subvert your spam filter. In Proc. LEET, 2008.
-
(2008)
Proc. LEET
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
26
-
-
33846893358
-
Paragraph: Thwarting signature learning by training maliciously
-
J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In Proc. RAID, 2006.
-
(2006)
Proc. RAID
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
29
-
-
78651446533
-
Stealthy poisoning attacks on PCA-based anomaly detectors
-
To appear
-
B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. Stealthy poisoning attacks on PCA-based anomaly detectors. In SIGMETRICS Performance Evaluation Review, 2009. To appear.
-
(2009)
SIGMETRICS Performance Evaluation Review
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
30
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
A. Soule, K. Salamatian, and N. Taft. Combining filtering and statistical methods for anomaly detection. In Proc. IMC, 2005.
-
(2005)
Proc. IMC
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
31
-
-
85180803572
-
Limits of learning-based signature generation with adversaries
-
S. Venkataraman, A. Blum, and D. Song. Limits of learning-based signature generation with adversaries. In Proc. NDSS, 2008.
-
(2008)
Proc. NDSS
-
-
Venkataraman, S.1
Blum, A.2
Song, D.3
-
32
-
-
53849091083
-
On attacking statistical spam filters
-
G. L. Wittel and S. F. Wu. On attacking statistical spam filters. In Proc. CEAS, 2004.
-
(2004)
Proc. CEAS
-
-
Wittel, G.L.1
Wu, S.F.2
|