-
1
-
-
0030143517
-
Web server workload characterization: The search for invariants
-
New York, NY, USA, ACM
-
M. F. Arlitt and C. L. Williamson. Web server workload characterization: The search for invariants. In Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, SIGMETRICS '96, pages 126-137, New York, NY, USA, 1996. ACM.
-
(1996)
Proceedings of the 1996 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '96
, pp. 126-137
-
-
Arlitt, M.F.1
Williamson, C.L.2
-
2
-
-
0038494682
-
Coolcat: An entropy-based algorithm for categorical clustering
-
New York, NY, USA, ACM
-
D. Barbaŕa, Y. Li, and J. Couto. Coolcat: An entropy-based algorithm for categorical clustering. In Proceedings of the eleventh international conference on Information and knowledge management, CIKM '02, pages 582-589, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the Eleventh International Conference on Information and Knowledge Management, CIKM '02
, pp. 582-589
-
-
Barbaŕa, D.1
Li, Y.2
Couto, J.3
-
3
-
-
84875966213
-
Detection of http-get attack with clustering and information theoretic measurements
-
In J. Garcia- Alfaro, F. Cuppens, N. Cuppens-Boulahia, A. Miri, and N. Tawbi, editors, volume 7743 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
P. Chwalinski, R. Belavkin, and X. Cheng. Detection of http-get attack with clustering and information theoretic measurements. In J. Garcia- Alfaro, F. Cuppens, N. Cuppens-Boulahia, A. Miri, and N. Tawbi, editors, Foundations and Practice of Security, volume 7743 of Lecture Notes in Computer Science, pages 45-61. Springer Berlin Heidelberg, 2013.
-
(2013)
Foundations and Practice of Security
, pp. 45-61
-
-
Chwalinski, P.1
Belavkin, R.2
Cheng, X.3
-
4
-
-
72449135256
-
Applying support vector regression for web effort estimation using a crosscompany dataset
-
Washington, DC, USA, IEEE Computer Society
-
rdInternational Symposium on Empirical Software Engineering and Measurement, ESEM '09, pages 191-202, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
rdInternational Symposium on Empirical Software Engineering and Measurement, ESEM '09
, pp. 191-202
-
-
Corazza, A.1
Martino, S.D.2
Ferrucci, F.3
Gravino, C.4
Mendes, E.5
-
5
-
-
0023294428
-
An intrusion-detection model
-
Feb
-
D. E. Denning. An intrusion-detection model. IEEE Trans. Softw. Eng., 13(2):222-232, Feb. 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
8
-
-
34548254914
-
Cluster-wise assessment of cluster stability
-
September
-
C. Hennig. Cluster-wise assessment of cluster stability. Computational Statistics and Data Analysis, 52(1):258-271, September 2007.
-
(2007)
Computational Statistics and Data Analysis
, vol.52
, Issue.1
, pp. 258-271
-
-
Hennig, C.1
-
9
-
-
77949285691
-
A normal-traffic network covert channel
-
L. Ji, H. Liang, Y. Song, and X. Niu. A normal-traffic network covert channel. In Computational Intelligence and Security, 2009. CIS '09. International Conference on, volume 1, pages 499-503, 2009.
-
(2009)
Computational Intelligence and Security, 2009. CIS '09. International Conference on
, vol.1
, pp. 499-503
-
-
Ji, L.1
Liang, H.2
Song, Y.3
Niu, X.4
-
10
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites
-
New York, NY, USA, ACM
-
thinternational conference on World Wide Web, WWW '02, pages 293-304, New York, NY, USA, 2002. ACM.
-
(2002)
thInternational Conference on World Wide Web, WWW '02
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
11
-
-
2442592260
-
-
John Wiley & Sons, Inc. New York, NY, USA
-
M. Kantardzic. Data Mining: Concepts, Models, Methods and Algorithms. John Wiley & Sons, Inc., New York, NY, USA, 2002.
-
(2002)
Data Mining: Concepts, Models, Methods and Algorithms
-
-
Kantardzic, M.1
-
13
-
-
84964247755
-
Sequence-order-independent network profiling for detecting application layer ddos attacks
-
S. Lee, G. Kim, and S. Kim. Sequence-order-independent network profiling for detecting application layer ddos attacks. EURASIP Journal on Wireless Communications and Networking, 2011(1):50, 2011.
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, Issue.1
, pp. 50
-
-
Lee, S.1
Kim, G.2
Kim, S.3
-
14
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
W. Lee and D. Xiang. Information-theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, pages 130- 143, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
15
-
-
0002727513
-
Distance between sets
-
M. Levandowsky and D. Winter. Distance between sets. Nature, 234(5323):34-35, 1971.
-
(1971)
Nature
, vol.234
, Issue.5323
, pp. 34-35
-
-
Levandowsky, M.1
Winter, D.2
-
16
-
-
14344259208
-
Entropy-based criterion in categorical clustering
-
New York, NY, USA, ACM
-
T. Li, S. Ma, and M. Ogihara. Entropy-based criterion in categorical clustering. In Proceedings of the twenty-first international conference on MAChine learning, ICML '04, pages 68-, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the Twenty-first International Conference on MAChine Learning, ICML '04
, pp. 68
-
-
Li, T.1
Ma, S.2
Ogihara, M.3
-
17
-
-
80053201944
-
A tutorial on bayes factor estimation with the product space method
-
T. Lodewyckx, W. Kim, M. D. Lee, F. Tuerlinckx, P. Kuppens, and E.-J. Wagenmakers. A tutorial on bayes factor estimation with the product space method. Journal of Mathematical Psychology, 55(5):331 - 347, 2011.
-
(2011)
Journal of Mathematical Psychology
, vol.55
, Issue.5
, pp. 331-347
-
-
Lodewyckx, T.1
Kim, W.2
Lee, M.D.3
Tuerlinckx, F.4
Kuppens, P.5
Wagenmakers, E.-J.6
-
19
-
-
70449513306
-
Modeling human behavior for defense against flash-crowd attacks
-
Piscataway, NJ, USA, IEEE Press
-
G. Oikonomou and J. Mirkovic. Modeling human behavior for defense against flash-crowd attacks. In Proceedings of the 2009 IEEE international conference on Communications, ICC'09, pages 625-630, Piscataway, NJ, USA, 2009. IEEE Press.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Communications, ICC'09
, pp. 625-630
-
-
Oikonomou, G.1
Mirkovic, J.2
-
20
-
-
61449207953
-
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks
-
feb
-
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly. DDos-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks. Networking, IEEE/ACM Transactions on, 17(1):26 -39, feb. 2009.
-
(2009)
Networking, IEEE/ACM Transactions on
, vol.17
, Issue.1
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
-
21
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
M. Schonlau, W. DuMouchel, W. H. Ju, A. F. Karr, M. Theus, and Y. Vardi. Computer Intrusion: Detecting Masquerades. Statistical Science, 16(1):58-74, 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
22
-
-
0442296744
-
A bayesian paradigm for designing intrusion detection systems
-
!ce:title.Computer Security and Statistics!/ce:title
-
S. L. Scott. A bayesian paradigm for designing intrusion detection systems. Computational Statistics & Data Analysis, 45(1):69 - 83, 2004. !ce:title.Computer Security and Statistics!/ce:title..
-
(2004)
Computational Statistics & Data Analysis
, vol.45
, Issue.1
, pp. 69-83
-
-
Scott, S.L.1
-
24
-
-
47249148481
-
Mitigating application-level denial of service attacks on web servers: A client-transparent approach
-
July, 15:1-15:49
-
M. Srivatsa, A. Iyengar, J. Yin, and L. Liu. Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Trans. Web, 2:15:1-15:49, July 2008.
-
(2008)
ACM Trans. Web
, vol.2
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
25
-
-
84856441401
-
Unsupervised clustering of web sessions to detect malicious and non-malicious website users
-
D. Stevanovic, N. Vlajic, and A. An. Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users. Procedia CS, 5:123-131, 2011.
-
(2011)
Procedia CS
, vol.5
, pp. 123-131
-
-
Stevanovic, D.1
Vlajic, N.2
An, A.3
-
26
-
-
84875926244
-
Detection of malicious and nonmalicious website visitors using unsupervised neural network learning
-
D. Stevanovic, N. Vlajic, and A. An. Detection of malicious and nonmalicious website visitors using unsupervised neural network learning. Applied Soft Computing, 2012.
-
(2012)
Applied Soft Computing
-
-
Stevanovic, D.1
Vlajic, N.2
An, A.3
-
27
-
-
84893631369
-
Steganalysis of network packet length based data hiding
-
A. Sur, A. Nair, A. Kumar, A. Jain, and S. Nandi. Steganalysis of network packet length based data hiding. Circuits, Systems, and Signal Processing, pages 1-18, 2012.
-
(2012)
Circuits, Systems, and Signal Processing
, pp. 1-18
-
-
Sur, A.1
Nair, A.2
Kumar, A.3
Jain, A.4
Nandi, S.5
-
28
-
-
33845567346
-
A novel model for detecting application layer DDoS attacks
-
IMSCCS '06, Washington, DC, USA, IEEE Computer Society
-
Y. Xie and S.-Z. Yu. A Novel Model for Detecting Application Layer DDoS Attacks. In Proceedings of the First International Multi- Symposiums on Computer and Computational Sciences - Volume 2 (IMSCCS'06) - Volume 02, IMSCCS '06, pages 56-63, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
Proceedings of the First International Multi- Symposiums on Computer and Computational Sciences - Volume 2 (IMSCCS'06)
, vol.2
, pp. 56-63
-
-
Xie, Y.1
Yu, S.-Z.2
-
29
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
February
-
Y. Xie and S.-Z. Yu. Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw., 17:15-25, February 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
|