-
2
-
-
0042421807
-
Statistical fraud detection: A review
-
R. J. Bolton and D. J. Hand. Statistical fraud detection: A review. Statistical Science, pages 235-249, 2002.
-
(2002)
Statistical Science
, pp. 235-249
-
-
Bolton, R.J.1
Hand, D.J.2
-
3
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In Proc. of NSDI, 2012.
-
(2012)
Proc. of NSDI
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
4
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM CSUR, 41(3):15, 2009.
-
(2009)
ACM CSUR
, vol.41
, Issue.3
, pp. 15
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
6
-
-
84891468926
-
Video browsing - A study of user behavior in online vod services
-
IEEE
-
L. Chen, Y. Zhou, and D. M. Chiu. Video browsing - a study of user behavior in online vod services. In 22nd International Conference on Computer Communications and Networks (ICCCN), 2013, pages 1-7. IEEE, 2013.
-
(2013)
22nd International Conference on Computer Communications and Networks (ICCCN), 2013
, pp. 1-7
-
-
Chen, L.1
Zhou, Y.2
Chiu, D.M.3
-
8
-
-
29244451861
-
Acas: Automated construction of application signatures
-
ACM
-
P. Haffner, S. Sen, O. Spatscheck, and D. Wang. Acas: automated construction of application signatures. In Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, pages 197-202. ACM, 2005.
-
(2005)
Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data
, pp. 197-202
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
11
-
-
33750373763
-
Data streaming algorithms for estimating entropy of network traffic
-
ACM
-
A. Lall, V. Sekar, M. Ogihara, J. Xu, and H. Zhang. Data streaming algorithms for estimating entropy of network traffic. In ACM SIGMETRICS Performance Evaluation Review, volume 34, pages 145-156. ACM, 2006.
-
(2006)
ACM SIGMETRICS Performance Evaluation Review
, vol.34
, pp. 145-156
-
-
Lall, A.1
Sekar, V.2
Ogihara, M.3
Xu, J.4
Zhang, H.5
-
13
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
IEEE
-
R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE Symposium on Security and Privacy (SP), pages 305-316. IEEE, 2010.
-
(2010)
2010 IEEE Symposium on Security and Privacy (SP)
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
15
-
-
84875579031
-
Statistical learning theory. Adaptive and learning systems for signal processing, communications, and control
-
V. N. Vapnik. Statistical learning theory. adaptive and learning systems for signal processing, communications, and control. Simon Haykin, 1998.
-
(1998)
Simon Haykin
-
-
Vapnik, V.N.1
-
16
-
-
33947660479
-
Covariance-matrix modeling and detecting various flooding attacks
-
D. S. Yeung, S. Jin, and X. Wang. Covariance-matrix modeling and detecting various flooding attacks. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 37(2):157-169, 2007.
-
(2007)
Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions On
, vol.37
, Issue.2
, pp. 157-169
-
-
Yeung, D.S.1
Jin, S.2
Wang, X.3
|