-
4
-
-
2442583303
-
The loss technique for detecting new denial of service attacks
-
Greensboro, NC, USA. March 2004
-
Allen WH, Marin GA. The loss technique for detecting new denial of service attacks, In: Proceedings of IEEE SoutheastCon, Greensboro, NC, USA. March 2004. p. 302-9.
-
Proceedings of IEEE SoutheastCon
, pp. 302-309
-
-
Allen, W.H.1
Marin, G.A.2
-
6
-
-
85092755815
-
Machine learning approaches to network anomaly detection
-
Cambridge, MA, USA. April 2007
-
Ahmed T, Oreshkin B, Coates M. Machine learning approaches to network anomaly detection, In: SYSML'07 proceedings of the 2nd USENIX workshop on tackling computer systems problems with machine learning techniques, Cambridge, MA, USA. April 2007.
-
SYSML'07 Proceedings of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques
-
-
Ahmed, T.1
Oreshkin, B.2
Coates, M.3
-
7
-
-
78649866466
-
On mitigating sampling-induced accuracy loss in traffic anomaly detection systems
-
S. Ali, I.U. Haq, S. Rizvi, N. Resheed, U. Sarfraz, and S.A. Khayam et al. On mitigating sampling-induced accuracy loss in traffic anomaly detection systems ACM SIGCOMM Computer Communication Review (CCR) 40 3 2010 5 16
-
(2010)
ACM SIGCOMM Computer Communication Review (CCR)
, vol.40
, Issue.3
, pp. 5-16
-
-
Ali, S.1
Haq, I.U.2
Rizvi, S.3
Resheed, N.4
Sarfraz, U.5
Khayam, S.A.6
-
10
-
-
21844493117
-
An application of Fourier series to the most significant digit problem
-
J. Boyle An application of Fourier series to the most significant digit problem American Mathematical Monthly 101 2 1994 879 886
-
(1994)
American Mathematical Monthly
, vol.101
, Issue.2
, pp. 879-886
-
-
Boyle, J.1
-
11
-
-
80054043105
-
Finite-state Markov chains obey Benford's law
-
A. Berger, P. Hill, B. Kaynar, and A. Ridder Finite-state Markov chains obey Benford's law SIAM Journal of Matrix Analysis and Applications 32 3 2011 665 684
-
(2011)
SIAM Journal of Matrix Analysis and Applications
, vol.32
, Issue.3
, pp. 665-684
-
-
Berger, A.1
Hill, P.2
Kaynar, B.3
Ridder, A.4
-
12
-
-
0020139872
-
Patterns in listings of failure-rate & mttf values and listings of other data
-
P. Becker Patterns in listings of failure-rate and MTTF values and listings of other data IEEE Transactions on Reliability 31 2 1982 132 134 (Pubitemid 12549107)
-
(1982)
IEEE Transactions on Reliability
, vol.R-31
, Issue.2
, pp. 132-134
-
-
Becker Peter, W.1
-
13
-
-
0038695506
-
An illustration of Benford's first digit law using alpha decay half lives
-
B. Buck, A. Merchant, and S. Perez An illustration of Benford's first digit law using alpha decay half lives European Journal in Physics 14 2 1993 59 63
-
(1993)
European Journal in Physics
, vol.14
, Issue.2
, pp. 59-63
-
-
Buck, B.1
Merchant, A.2
Perez, S.3
-
14
-
-
80052032506
-
Searching for electoral irregularities in an established democracy: Applying Benford's Law tests to Bundestag elections in Unified Germany
-
C. Breunig, and A. Goerres Searching for electoral irregularities in an established democracy: applying Benford's Law tests to Bundestag elections in Unified Germany Electoral Studies 30 3 2011 534 545
-
(2011)
Electoral Studies
, vol.30
, Issue.3
, pp. 534-545
-
-
Breunig, C.1
Goerres, A.2
-
16
-
-
79952247200
-
-
[accessed 06.13.]
-
Benford Online Bibliography. 2013. Available from: 〈 http://www.benfordonline.net [accessed 06.13.]
-
(2013)
Benford Online Bibliography
-
-
-
19
-
-
77951539790
-
SYN flooding attack detection based on entropy computing
-
Honolulu, Hawaii, USA. December 2009
-
Bellaïche M, Grégoire JC., SYN flooding attack detection based on entropy computing. In: Proceedings of the IEEE GLOBECOM. Honolulu, Hawaii, USA. December 2009. p. 1-6.
-
Proceedings of the IEEE GLOBECOM
, pp. 1-6
-
-
Bellaïche, M.1
Grégoire, J.C.2
-
20
-
-
84903531892
-
Anomaly extraction in backbone networks using association rules
-
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian Anomaly extraction in backbone networks using association rules IEEE/ACM Transactions on Networking 20 6 2012 1788 1799
-
(2012)
IEEE/ACM Transactions on Networking
, vol.20
, Issue.6
, pp. 1788-1799
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
21
-
-
0002810030
-
Long-range dependence: A review
-
H.A. David, H.T David, Iowa State University Press
-
D.R. Cox Long-range dependence: a review H.A. David, H.T David, Statistics: an appraisal 1984 Iowa State University Press 55 74
-
(1984)
Statistics: An Appraisal
, pp. 55-74
-
-
Cox, D.R.1
-
22
-
-
0034832871
-
On the nonstationarity of Internet traffic
-
New York, NY, USA. June 2001
-
Cao J, Cleveland WS, Lin D, Son DX. On the nonstationarity of Internet traffic. In: Proceedings of ACM SIGMETRICS international conference on measurement and modeling of computer systems. New York, NY, USA. June 2001. p. 102-12.
-
Proceedings of ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
, pp. 102-112
-
-
Cao, J.1
Cleveland, W.S.2
Lin, D.3
Son, D.X.4
-
24
-
-
80052448261
-
Detecting heavy change in the heavy hitter distribution of network traffic
-
Istanbul, Turkey. July 2011
-
Callegari C, Giordano S, Pagano M, Pepe T. Detecting heavy change in the heavy hitter distribution of network traffic. In: Proceedings of the 7th International wireless communications and mobile computing conference (IWCMC). Istanbul, Turkey. July 2011. p. 1298-303.
-
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC)
, pp. 1298-1303
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
Pepe, T.4
-
25
-
-
51849117294
-
Application of wavelet packet transform to network anomaly detection
-
S. Balandin, D. Moltchanov, Y. Koucheryavy, Springer Berlin, Heidelberg
-
C. Callegari, S. Giordano, and M. Pagano Application of wavelet packet transform to network anomaly detection S. Balandin, D. Moltchanov, Y. Koucheryavy, Next Generation teletraffic and wired/wireless advanced networking. Lecture notes in computer science vol. 5174 2008 Springer Berlin, Heidelberg 246 257
-
(2008)
Next Generation Teletraffic and Wired/wireless Advanced Networking. Lecture Notes in Computer Science
, vol.5174 VOL.
, pp. 246-257
-
-
Callegari, C.1
Giordano, S.2
Pagano, M.3
-
26
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Taipei, Taiwan. November 2002
-
Cheng CM, Kung HT, Tan KS. Use of spectral analysis in defense against DoS attacks. In: Proceedings of IEEE GLOBECOM. Taipei, Taiwan. November 2002. p. 2143-8.
-
Proceedings of IEEE GLOBECOM
, pp. 2143-2148
-
-
Cheng, C.M.1
Kung, H.T.2
Tan, K.S.3
-
28
-
-
67949109641
-
Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (m3l) PCA-based approach
-
V. Chatzigiannakis, S. Papavassiliou, and G. Androulidakis Improving network anomaly detection effectiveness via an integrated multi-metric-multi- link (m3l) PCA-based approach Security and Communication Networks 2 3 2009 289 304
-
(2009)
Security and Communication Networks
, vol.2
, Issue.3
, pp. 289-304
-
-
Chatzigiannakis, V.1
Papavassiliou, S.2
Androulidakis, G.3
-
29
-
-
78649292799
-
A novel multi time-scales PCA-based anomaly detection system
-
Ottawa, Canada. July 2010
-
Callegari C, Gazzarrini L, Giordano S, Pagano M, Pepe T. A novel multi time-scales PCA-based anomaly detection system. In: Proceedings of the international symposium on performance evaluation of computer and telecommunication systems, SPECTS. Ottawa, Canada. July 2010. p. 156-62.
-
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS
, pp. 156-162
-
-
Callegari, C.1
Gazzarrini, L.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
-
31
-
-
62949129764
-
Extracting hidden anomalies using sketch and non-Gaussian multiresolution statistical detection procedures
-
Kyoto, Japan. August 2007
-
Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K. Extracting hidden anomalies using sketch and non-Gaussian multiresolution statistical detection procedures. In: Proceedings of the SIGCOMM LSAD workshop. Kyoto, Japan. August 2007.
-
Proceedings of the SIGCOMM LSAD Workshop
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
32
-
-
0010648031
-
The theory of probabilities and telephone conversations
-
(First published in: Nyt Tidsskrift for Matematik B 1909; 20: 33-39s.)
-
Erlang AK. The theory of probabilities and telephone conversations. Transactions of the Danish Academy of Technical Sciences, no. 2, 1948. (First published in: Nyt Tidsskrift for Matematik B 1909; 20: 33-39s.)
-
(1948)
Transactions of the Danish Academy of Technical Sciences
, vol.2
-
-
Erlang, A.K.1
-
34
-
-
0037632943
-
Benford's law for exponential random variables
-
DOI 10.1016/S0167-7152(03)00101-9, PII S0167715203001019
-
H. Engel, and C. Leuenberger Benford's law for exponential random variables Statistics & Probability Letters 63 4 2003 361 365 (Pubitemid 36742502)
-
(2003)
Statistics and Probability Letters
, vol.63
, Issue.4
, pp. 361-365
-
-
Engel, H.-A.1
Leuenberger, C.2
-
35
-
-
0003311938
-
Characteristics of TCP connection arrivals
-
K. Park, W. Willinger, John Wiley & Sons Inc. New York, USA
-
A. Feldmann Characteristics of TCP connection arrivals K. Park, W. Willinger, Self-similar network traffic and performance evaluation 2000 John Wiley & Sons Inc. New York, USA 367 400
-
(2000)
Self-similar Network Traffic and Performance Evaluation
, pp. 367-400
-
-
Feldmann, A.1
-
36
-
-
63549150030
-
A simple explanation of Benford's law
-
R.M. Fewster A simple explanation of Benford's law The American Statistician 63 1 2009 26 32
-
(2009)
The American Statistician
, vol.63
, Issue.1
, pp. 26-32
-
-
Fewster, R.M.1
-
37
-
-
34250355507
-
A generalized Benford's law for JPEG coefficients and its applications in image forensics
-
San Jose, CA. February 2007
-
Fu D, Shi YQ, Su W. A generalized Benford's law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE6505, security, steganography, and watermarking of multimedia contents IX, 65051L. San Jose, CA. February 2007.
-
Proceedings of SPIE6505, Security, Steganography, and Watermarking of Multimedia Contents IX, 65051L
-
-
Fu, D.1
Shi, Y.Q.2
Su, W.3
-
38
-
-
84863616826
-
An orchestration approach for unwanted Internet traffic identification
-
E. Feitosa, E. Souto, and D.H. Sadok An orchestration approach for unwanted Internet traffic identification Computer Networks 56 12 2012 2805 2831
-
(2012)
Computer Networks
, vol.56
, Issue.12
, pp. 2805-2831
-
-
Feitosa, E.1
Souto, E.2
Sadok, D.H.3
-
41
-
-
44849134557
-
A global security architecture for intrusion detection on computer networks
-
A.K. Ganame, J. Bourgeoisa, R. Bidou, and F. Spiesa A global security architecture for intrusion detection on computer networks Computers & Security 27 2008 30 47
-
(2008)
Computers & Security
, vol.27
, pp. 30-47
-
-
Ganame, A.K.1
Bourgeoisa, J.2
Bidou, R.3
Spiesa, F.4
-
42
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garica-Teodoro, J. DIaz-Verdejoa, G. Macia-Fernandeza, and E. Vazquez Anomaly-based network intrusion detection: techniques, systems and challenges Computers & Security 28 1 2009 18 28
-
(2009)
Computers & Security
, vol.28
, Issue.1
, pp. 18-28
-
-
Garica-Teodoro, P.1
Diaz-Verdejoa, J.2
Macia-Fernandeza, G.3
Vazquez, E.4
-
43
-
-
84972541029
-
A statistical derivation of the significant-digit law
-
T. Hill A statistical derivation of the significant-digit law Statistical Science 10 4 1996 354 363
-
(1996)
Statistical Science
, vol.10
, Issue.4
, pp. 354-363
-
-
Hill, T.1
-
46
-
-
67649366072
-
Detecting problems in survey data using Benford's law
-
G. Judge, and L. Schechter Detecting problems in survey data using Benford's law Journal of Human Resources 44 1 2009 1 24
-
(2009)
Journal of Human Resources
, vol.44
, Issue.1
, pp. 1-24
-
-
Judge, G.1
Schechter, L.2
-
47
-
-
84874309665
-
Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection
-
Florida, USA. October 2012
-
James C, Murthy HA. Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection. In: Proceedings of the 37th annual IEEE Conference on local computer networks (LCN). Florida, USA. October 2012.
-
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN)
-
-
James, C.1
Murthy, H.A.2
-
48
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
S.S. Kim, and R.AL Narasimha Statistical techniques for detecting traffic anomalies through packet header data IEEE/ACM Transactions on Networking 16 3 2008 562 575
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 562-575
-
-
Kim, S.S.1
Narasimha, R.A.2
-
49
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Las Vegas, NV, USA, December 2003
-
Kruegel C, Mutz D, Robertson W, Valeur F. Bayesian event classification for intrusion detection. In: Proceedings of the 19th annual computer security applications conference. Las Vegas, NV, USA, December 2003. p. 14-23.
-
Proceedings of the 19th Annual Computer Security Applications Conference
, pp. 14-23
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
50
-
-
51849118831
-
Traffic anomaly detection at fine time scales with Bayes nets
-
Bucharest, Romania
-
Kline J, Nam S, Barford P, Plonka D, Ron A. Traffic anomaly detection at fine time scales with Bayes nets. In: Proceedings of the international conference on Internet monitoring and protection. Bucharest, Romania. 2008. p. 37-46.
-
(2008)
Proceedings of the International Conference on Internet Monitoring and Protection
, pp. 37-46
-
-
Kline, J.1
Nam, S.2
Barford, P.3
Plonka, D.4
Ron, A.5
-
51
-
-
0028377540
-
On the self-similar nature of Ethernet traffic (extended version)
-
W.E. Leland, M.S. Taqqu, W. Willinger, and D.V. Wilson On the self-similar nature of Ethernet traffic (extended version) IEEE/ACM Transactions on Networking 2 1 1994 1 15
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.1
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
Wilson, D.V.4
-
52
-
-
68349085747
-
Analysis and modeling of a campus wireless network TCP/IP traffic
-
I.W.C. Lee, and A.O. Fapojuwo Analysis and modeling of a campus wireless network TCP/IP traffic Computer Networks 53 15 2009 2674 2687
-
(2009)
Computer Networks
, vol.53
, Issue.15
, pp. 2674-2687
-
-
Lee, I.W.C.1
Fapojuwo, A.O.2
-
53
-
-
0034556676
-
Survival Distributions Satisfying Benford's Law
-
L.M. Leemis, B.W. Schmeiser, and D.L. Evans Survival distributions satisfying Benford's law The American Statistician 54 3 2000 236 241 (Pubitemid 33204717)
-
(2000)
American Statistician
, vol.54
, Issue.4
, pp. 236-241
-
-
Leemis, L.M.1
Schmeiser, B.W.2
Evans, D.L.3
-
55
-
-
70349121381
-
Effective DDoS attacks detection using generalized entropy metric
-
Taipei, Taiwan. June 2009
-
Li K, Zhou W, Yu S, Dai B. Effective DDoS attacks detection using generalized entropy metric. In: Proceedings of the 9th international conference on algorithms and architectures for parallel processing, ICA3PP 2009. Taipei, Taiwan. June 2009. p. 266-80.
-
Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2009
, pp. 266-280
-
-
Li, K.1
Zhou, W.2
Yu, S.3
Dai, B.4
-
56
-
-
33646900187
-
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
-
DOI 10.1016/j.cose.2005.11.007, PII S0167404805001963
-
M. Li Change trend of averaged Hurst parameter of traffic under DDOS flood attacks Computers & Security 25 3 2006 213 220 (Pubitemid 43796072)
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 213-220
-
-
Li, M.1
-
57
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
New York, NY, USA. October 2005
-
Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. In: Proceedings of the 2005 conference on applications, technologies, architectures, and protocols for computer communications (ACM SIGCOMM'05). New York, NY, USA. October 2005. p. 217-28.
-
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM SIGCOMM'05)
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
59
-
-
0033619940
-
The role of biostatistics in the prevention, detection and treatment of fraud in clinical trials
-
Buyse Marc, Stephen L. George, Evans Stephen, Nancy L. Geller, Ranstam Jonas, Scherrer Bruno, Lesaffre Emmanuel, Murray Gordon, Edler Lutz, Hutton Jane, Colton Theodore, Lachenbruch Peter, and Verma Babul The role of biostatistics in the prevention, detection and treatment of fraud in clinical trials Statistics in Medicine 18 24 1999 3435 3451 (Pubitemid 30041358)
-
(1999)
Statistics in Medicine
, vol.18
, Issue.24
, pp. 3435-3451
-
-
Buyse, M.1
George, S.L.2
Evans, S.3
Geller, N.L.4
Ranstam, J.5
Scherrer, B.6
Lesaffre, E.7
Murray, G.8
Edler, L.9
Hutton, J.10
Colton, T.11
Lachenbruch, P.12
Verma, B.L.13
-
61
-
-
84896316288
-
-
MAWI. Working Group Traffic Archive, samplepoint-F. 2013. Available from [accessed 06.13].
-
MAWI. Working Group Traffic Archive, samplepoint-F. 2013. Available from 〈http://mawi.wide.ad.jp/mawi/samplepoint-F/2009 [accessed 06.13].
-
-
-
-
62
-
-
58149509288
-
Election forensics: The second-digit Benford's law test and recent American presidential elections
-
Salt Lake City. September 2006
-
Mebane Jr WR. Election forensics: the second-digit Benford's law test and recent American presidential elections. In: Proceedings of the election fraud conference. Salt Lake City. September 2006.
-
Proceedings of the Election Fraud Conference
-
-
Mebane Jr., W.R.1
-
64
-
-
0002802290
-
A taxpayer compliance application of Benford's law
-
M. Nigrini A taxpayer compliance application of Benford's law Journal of the American Taxation Association 18 1 1996 72 91
-
(1996)
Journal of the American Taxation Association
, vol.18
, Issue.1
, pp. 72-91
-
-
Nigrini, M.1
-
65
-
-
17144397597
-
The use of Benford's law as an aid in analytical procedures
-
M. Nigrini The use of Benford's law as an aid in analytical procedures Auditing: A Journal of Practice & Theory 16 2 1997 52 67
-
(1997)
Auditing: A Journal of Practice & Theory
, vol.16
, Issue.2
, pp. 52-67
-
-
Nigrini, M.1
-
67
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
Vouliagmeni, Greece. October 2008
-
Nychis G, Sekar V, Andersen DG, Kim H, Zhang H. An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8th ACM SIGCOMM Internet measurement conference. Vouliagmeni, Greece. October 2008. p. 151-6.
-
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
68
-
-
84896318595
-
-
[accessed 06.13]
-
NUST Traffic Dataset. 2013. 〈http://wisnet.seecs.nust. edu.pk/projects/ENS/DataSets.html [accessed 06.13].
-
(2013)
NUST Traffic Dataset
-
-
-
69
-
-
84871570590
-
Agreement of drug discovery data with Benford's law
-
M. Orita, Y. Hagiwara, A. Moritomo, K. Tsunoyama, T. Watanabe, and K. Ohno Agreement of drug discovery data with Benford's law Expert Opinion on Drug Discovery 8 1 2013 1 5
-
(2013)
Expert Opinion on Drug Discovery
, vol.8
, Issue.1
, pp. 1-5
-
-
Orita, M.1
Hagiwara, Y.2
Moritomo, A.3
Tsunoyama, K.4
Watanabe, T.5
Ohno, K.6
-
70
-
-
0029323403
-
Wide area traffic: The failure of Poisson modeling
-
V. Paxson, and S. Floyd Wide area traffic: the failure of Poisson modeling IEEE/ACM Transactions on Networking 3 3 1995 226 244
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
72
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
-
A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 12 2007 3448 3470 (Pubitemid 46921030)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
73
-
-
0000109243
-
On the distribution of first significant digits
-
R.S. Pinkham On the distribution of first significant digits The Annuals of Mathematical Statistics 32 4 1961 1223 1230
-
(1961)
The Annuals of Mathematical Statistics
, vol.32
, Issue.4
, pp. 1223-1230
-
-
Pinkham, R.S.1
-
74
-
-
84864509699
-
Quick anomaly detection by the Newcomb-Benford law, with applications to electoral processes data from the USA, Puerto Rico and Venezuela
-
L. Pericchi, and D. Torres Quick anomaly detection by the Newcomb-Benford law, with applications to electoral processes data from the USA, Puerto Rico and Venezuela Statistical Science 26 4 2011 502 516
-
(2011)
Statistical Science
, vol.26
, Issue.4
, pp. 502-516
-
-
Pericchi, L.1
Torres, D.2
-
77
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, USA
-
Portnoy L, Eskin E, Stolfo SJ. Intrusion detection with unlabeled data using clustering. In: Proceedings of the ACM workshop on data mining applied to security. Philadelphia, PA, USA, 2001.
-
(2001)
Proceedings of the ACM Workshop on Data Mining Applied to Security
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.J.3
-
79
-
-
38049101469
-
Collaborative attack detection in high-speed networks
-
Leipzig, Germany: Springer
-
Rehak M, Pechoucek M, Celeda P, Krmicek V, Minarik P, Medvigy D. Collaborative attack detection in high-speed networks. In: Proceedings of the 5th international central and eastern European conference on multi-agent systems and applications (CEEMAS'07). Leipzig, Germany: Springer; 2007. p. 73-82.
-
(2007)
Proceedings of the 5th International Central and Eastern European Conference on Multi-agent Systems and Applications (CEEMAS'07)
, pp. 73-82
-
-
Rehak, M.1
Pechoucek, M.2
Celeda, P.3
Krmicek, V.4
Minarik, P.5
Medvigy, D.6
-
80
-
-
84896316439
-
An observation on the significant digits of the binomial coefficients and factorials
-
B.P. Sarkar An observation on the significant digits of the binomial coefficients and factorials Sankhya: The Indian Journal of Statistics Series B 35 3 1973 363 364
-
(1973)
Sankhya: The Indian Journal of Statistics Series B
, vol.35
, Issue.3
, pp. 363-364
-
-
Sarkar, B.P.1
-
84
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
Berkeley, CA, October 2005
-
Soule A, Salamatian K, Taft N. Combining filtering and statistical methods for anomaly detection. In: Proceedings of ACM SIGCOMM Internet measurement conference. Berkeley, CA, October 2005. p. 331-344.
-
Proceedings of ACM SIGCOMM Internet Measurement Conference
, pp. 331-344
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
86
-
-
49949084678
-
Multi-agent reinforcement learning for intrusion detection
-
A. Servin, and D. Kudenko Multi-agent reinforcement learning for intrusion detection Lecture Notes in Computer Science 4865 2008 211 223
-
(2008)
Lecture Notes in Computer Science
, vol.4865
, pp. 211-223
-
-
Servin, A.1
Kudenko, D.2
-
87
-
-
84896319163
-
-
SERPRO. Brazilian Federal Service of data processing. 2011
-
SERPRO. Brazilian Federal Service of data processing. 2011. 〈http://www.serpro.gov.br.
-
-
-
-
89
-
-
49649123060
-
A novel covariance matrix based approach for detecting network anomalies
-
Halifax, Canada. May 2008
-
Tavallaee M, Lu W, Iqbal SA, Ghorbani A. A novel covariance matrix based approach for detecting network anomalies. In: Proceedings of the 6th annual communication networks and services research conference. Halifax, Canada. May 2008. p. 75-81.
-
Proceedings of the 6th Annual Communication Networks and Services Research Conference
, pp. 75-81
-
-
Tavallaee, M.1
Lu, W.2
Iqbal, S.A.3
Ghorbani, A.4
-
90
-
-
81855220824
-
Denial-of-service attack detection based on multivariate correlation analysis
-
Springer Berlin, Heidelberg
-
Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu Denial-of-service attack detection based on multivariate correlation analysis Neural information processing, Lecture notes in computer science vol. 7064 2011 Springer Berlin, Heidelberg 756 765
-
(2011)
Neural Information Processing, Lecture Notes in Computer Science
, vol.7064 VOL.
, pp. 756-765
-
-
Tan, Z.1
Jamdagni, A.2
He, X.3
Nanda, P.4
Liu, R.P.5
-
92
-
-
78650155254
-
-
Springer Berlin, Heidelberg
-
M. Thottan, G. Liu, and C. Ji Anomaly detection approaches for communication networks, algorithms for next generation networks 2010 Springer Berlin, Heidelberg 239 261
-
(2010)
Anomaly Detection Approaches for Communication Networks, Algorithms for Next Generation Networks
, pp. 239-261
-
-
Thottan, M.1
Liu, G.2
Ji, C.3
-
94
-
-
70249099684
-
Fibonacci and Lucas numbers tend to obey Benford's law
-
J. Wlodarski Fibonacci and Lucas numbers tend to obey Benford's law Fibonacci Quarterly 9 1 1971 87 88
-
(1971)
Fibonacci Quarterly
, vol.9
, Issue.1
, pp. 87-88
-
-
Wlodarski, J.1
-
96
-
-
33947660479
-
Covariance-matrix modeling and detecting various flooding attacks
-
DOI 10.1109/TSMCA.2006.889480, Special Issue on Critical Reliability Challenges and Practices
-
D.S. Yeung, S. Jin, and X. Wang Covariance-matrix modeling and detecting various flooding attacks IEEE Transactions on. Systems, Man and Cybernetics, Part A 37 2 2007 157 169 (Pubitemid 46485241)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans
, vol.37
, Issue.2
, pp. 157-169
-
-
Yeung, D.S.1
Jin, S.2
Wang, X.3
-
98
-
-
1942436335
-
Robustness of the Markov-chain model for cyber-attack detection
-
N. Ye, Y. Zhang, and C.M. Borror Robustness of the Markov-chain model for cyber-attack detection IEEE Transactions on Reliability 53 1 2004 116 123
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
100
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
NY, USA, June 2001
-
Zhang Z, Li J, Manikopoulos CN, Jorgenson J, Ucles J. HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In: Proceedings of the 2001 IEEE workshop on information assurance and security. NY, USA, June 2001. p. 85-90.
-
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.N.3
Jorgenson, J.4
Ucles, J.5
|