-
2
-
-
78650696546
-
Understanding data center traffic characteristics
-
T. Benson, A. Anand, A. Akella, M. Zhang, Understanding data center traffic characteristics, ACM SIGCOMM Computer Communication Review 40 92-99.
-
ACM SIGCOMM Computer Communication Review
, vol.40
, pp. 92-99
-
-
Benson, T.1
Anand, A.2
Akella, A.3
Zhang, M.4
-
3
-
-
0041873705
-
Non-linear time-series models of ethernet traffic
-
K. Chandra, C. You, G. Olowoyeye, C. Thompson, Non-linear time-series models of ethernet traffic, in: Submitted to INFOCOM '99, 1998.
-
(1998)
Submitted to INFOCOM '99
-
-
Chandra, K.1
You, C.2
Olowoyeye, G.3
Thompson, C.4
-
4
-
-
0029734368
-
Phase objects in synchrotron radiation hard X-ray imaging
-
P. Cloetens, R. Barrett, J. Baruchel, J.P. Guigay, and M. Schlenker Phase objects in synchrotron radiation hard X-ray imaging Journal of Physics D: Applied Physics 29 1996 133 146
-
(1996)
Journal of Physics D: Applied Physics
, vol.29
, pp. 133-146
-
-
Cloetens, P.1
Barrett, R.2
Baruchel, J.3
Guigay, J.P.4
Schlenker, M.5
-
5
-
-
77955771346
-
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis
-
Z. Fadlullah, T. Taleb, A. Vasilakos, M. Guizani, and N. Kato DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis IEEE/ACM Transactions on Networking 18 2010 1234 1247
-
(2010)
IEEE/ACM Transactions on Networking
, vol.18
, pp. 1234-1247
-
-
Fadlullah, Z.1
Taleb, T.2
Vasilakos, A.3
Guizani, M.4
Kato, N.5
-
6
-
-
84939061075
-
Traffic modeling for telecommunications networks
-
V. Frost, and B. Melamed Traffic modeling for telecommunications networks IEEE Communications Magazine 32 1994 70 81
-
(1994)
IEEE Communications Magazine
, vol.32
, pp. 70-81
-
-
Frost, V.1
Melamed, B.2
-
8
-
-
49849084469
-
A feasible intrusion detector for recognizing IIS attacks based on neural networks
-
S. Horng, P. Fan, Y. Chou, Y. Chang, and Y. Pan A feasible intrusion detector for recognizing IIS attacks based on neural networks Computers & Security 27 2008 84 100
-
(2008)
Computers & Security
, vol.27
, pp. 84-100
-
-
Horng, S.1
Fan, P.2
Chou, Y.3
Chang, Y.4
Pan, Y.5
-
9
-
-
61749104382
-
Profiling and identification of P2P traffic
-
Y. Hu, D.M. Chiu, and J. Lui Profiling and identification of P2P traffic Computer Networks 53 2009 849 863
-
(2009)
Computer Networks
, vol.53
, pp. 849-863
-
-
Hu, Y.1
Chiu, D.M.2
Lui, J.3
-
10
-
-
79955775579
-
Profiling-by-association: A resilient traffic profiling solution for the internet backbone
-
Philadelphia, USA
-
M. Iliofotou, B. Gallagher, T. Eliassi-Rad, G. Xie, M. Faloutsos, Profiling-by-association: a resilient traffic profiling solution for the internet backbone, in: ACM CoNEXT 2010, Philadelphia, USA, 2010, pp. 1-5.
-
(2010)
ACM CoNEXT 2010
, pp. 1-5
-
-
Iliofotou, M.1
Gallagher, B.2
Eliassi-Rad, T.3
Xie, G.4
Faloutsos, M.5
-
11
-
-
78649491247
-
Network prefix-level traffic profiling: Characterizing, modeling, and evaluation
-
H. Jiang, Z. Ge, S. Jin, J. Wang, Network prefix-level traffic profiling: Characterizing, modeling, and evaluation, Computer Networks 54 3327-3340.
-
Computer Networks
, vol.54
, pp. 3327-3340
-
-
Jiang, H.1
Ge, Z.2
Jin, S.3
Wang, J.4
-
12
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
Philadelphia, Pennsylvania, USA
-
T. Karagiannis, K. Papagiannaki, M. Faloutsos, BLINC: multilevel traffic classification in the dark, in: SIGCOMM'05, Philadelphia, Pennsylvania, USA, 2005, pp. 229-240.
-
(2005)
SIGCOMM'05
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
13
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
S. Kim, and A. Reddy Statistical techniques for detecting traffic anomalies through packet header data IEEE/ACM Transactions on Networking 16 2008 562 575
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, pp. 562-575
-
-
Kim, S.1
Reddy, A.2
-
14
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, C. Diot, Mining anomalies using traffic feature distributions, in: SIGCOMM '05, 2005, pp. 217-228.
-
(2005)
SIGCOMM '05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
16
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, in: DISCEX, 2000, pp. 12-26.
-
(2000)
DISCEX
, pp. 12-26
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
-
17
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das The 1999 DARPA off-line intrusion detection evaluation Computer Networks 34 2000 579 595
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
18
-
-
33845614039
-
Impact of packet sampling on portscan detection
-
J. Mai, A. Sridharan, C. Chuah, H. Zang, and T. Ye Impact of packet sampling on portscan detection IEEE Journal on Selected Areas in Communications 24 2006 2285 2298
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, pp. 2285-2298
-
-
Mai, J.1
Sridharan, A.2
Chuah, C.3
Zang, H.4
Ye, T.5
-
19
-
-
67650149213
-
Spatio-temporal network anomaly detection by assessing deviations of empirical measures
-
I. Paschalidis, and G. Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures IEEE/ACM Transactions on Networking 17 2009 685 697
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, pp. 685-697
-
-
Paschalidis, I.1
Smaragdakis, G.2
-
20
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson Bro: a system for detecting network intruders in real-time Computer Networks 31 1999 2435 2463
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
21
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
Y. Qiao, X. Xin, Y. Bin, and S. Ge Anomaly intrusion detection method based on HMM Electronics Letters 38 2002 663 664
-
(2002)
Electronics Letters
, vol.38
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.2
Bin, Y.3
Ge, S.4
-
24
-
-
84929445167
-
Towards trusted cloud computing
-
N. Santos, K.P. Gummadi, R. Rodrigues, Towards trusted cloud computing, in: USENIX Workshop On Hot Topics in Cloud Computing (HotCloud), 2009, pp. 1-5.
-
(2009)
USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)
, pp. 1-5
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
25
-
-
65249105995
-
Accurate anomaly detection through parallelism
-
S. Shanbhag, and T. Wolf Accurate anomaly detection through parallelism IEEE Network 23 2009 22 28
-
(2009)
IEEE Network
, vol.23
, pp. 22-28
-
-
Shanbhag, S.1
Wolf, T.2
-
26
-
-
84866102744
-
Advanced probabilistic approach for network intrusion forecasting and detection
-
S. Shin, S. Lee, H. Kim, and S. Kim Advanced probabilistic approach for network intrusion forecasting and detection Expert Systems with Applications 40 2013 315 322
-
(2013)
Expert Systems with Applications
, vol.40
, pp. 315-322
-
-
Shin, S.1
Lee, S.2
Kim, H.3
Kim, S.4
-
27
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
T. Shon, and J. Moon A hybrid machine learning approach to network anomaly detection Information Sciences 177 2007 3799 3821
-
(2007)
Information Sciences
, vol.177
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
30
-
-
75749155657
-
Structural stability, catastrophe theory, and applied mathematics
-
R. Thom Structural stability, catastrophe theory, and applied mathematics SIAM Review 19 1977 189 201
-
(1977)
SIAM Review
, vol.19
, pp. 189-201
-
-
Thom, R.1
-
31
-
-
25144437034
-
An exploratory development on the Hurst parameter variety of network traffic abnormity signal [J]
-
X. WANG, and B. FANG An exploratory development on the Hurst parameter variety of network traffic abnormity signal [J] Journal of Harbin Institute of Technology 37 2005 1046 1049
-
(2005)
Journal of Harbin Institute of Technology
, vol.37
, pp. 1046-1049
-
-
Wang, X.1
Fang, B.2
-
32
-
-
77957956906
-
Anomaly detection of network traffic based on autocorrelation principle
-
X. Wei, H. Han-ping, and Y. Yue Anomaly detection of network traffic based on autocorrelation principle Journal of Communication and Computer 4 2007 15 19
-
(2007)
Journal of Communication and Computer
, vol.4
, pp. 15-19
-
-
Wei, X.1
Han-Ping, H.2
Yue, Y.3
-
33
-
-
62549110832
-
Estimating parameters of chaotic systems under noise-induced synchronization
-
X. Wu, and Z. Wang Estimating parameters of chaotic systems under noise-induced synchronization Chaos, Solitons & Fractals 39 2009 689 696
-
(2009)
Chaos, Solitons & Fractals
, vol.39
, pp. 689-696
-
-
Wu, X.1
Wang, Z.2
-
34
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Y. Xie, and S. Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors IEEE/ACM Transactions on Networking 17 2009 54 65
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, pp. 54-65
-
-
Xie, Y.1
Yu, S.2
|