메뉴 건너뛰기




Volumn 8443 LNAI, Issue PART 1, 2014, Pages 1-14

MalSpot: Multi2 malicious network behavior patterns analysis

Author keywords

anmoaly detection; multi linear; multi resolution; tensor; uncorrelated levels

Indexed keywords

DATA MINING; TENSORS;

EID: 84901281683     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-06608-0_1     Document Type: Conference Paper
Times cited : (30)

References (13)
  • 1
    • 84870877621 scopus 로고    scopus 로고
    • Analysis of a "/0" stealth scan from a botnet
    • Dainotti, A.: Analysis of a "/0" stealth scan from a botnet. In: IMC 2012 (2012)
    • (2012) IMC 2012
    • Dainotti, A.1
  • 2
    • 67049083427 scopus 로고    scopus 로고
    • Window-based tensor analysis on high-dimensional and multi-aspect streams
    • Sun, J., Papadimitriou, S., Yu, P.S.: Window-based tensor analysis on high-dimensional and multi-aspect streams. In: ICDM, pp. 1076-1080 (2006)
    • (2006) ICDM , pp. 1076-1080
    • Sun, J.1    Papadimitriou, S.2    Yu, P.S.3
  • 3
    • 80052744565 scopus 로고    scopus 로고
    • Multiaspectforensics: Pattern mining on large-scale heterogeneous networks with tensor analysis
    • Maruhashi, K., Guo, F., Faloutsos, C.: Multiaspectforensics: Pattern mining on large-scale heterogeneous networks with tensor analysis. In: ASONAM 2011 (2011)
    • (2011) ASONAM 2011
    • Maruhashi, K.1    Guo, F.2    Faloutsos, C.3
  • 5
    • 68649096448 scopus 로고    scopus 로고
    • Tensor decompositions and applications
    • Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Review 51(3), 455-500 (2009)
    • (2009) SIAM Review , vol.51 , Issue.3 , pp. 455-500
    • Kolda, T.G.1    Bader, B.W.2
  • 6
    • 67049173946 scopus 로고    scopus 로고
    • Scalable tensor decompositions for multi-aspect data mining
    • Kolda, T., Sun, J.: Scalable tensor decompositions for multi-aspect data mining. In: ICDM (2008)
    • (2008) ICDM
    • Kolda, T.1    Sun, J.2
  • 8
    • 84882451101 scopus 로고    scopus 로고
    • A scalable network forensics mechanism for stealthy self-propagating attacks
    • Chen, L.-M., Chen, M.-C., Liao, W., Sun, Y.S.: A scalable network forensics mechanism for stealthy self-propagating attacks. Computer Communications (2013)
    • (2013) Computer Communications
    • Chen, L.-M.1    Chen, M.-C.2    Liao, W.3    Sun, Y.S.4
  • 9
    • 35048834810 scopus 로고    scopus 로고
    • Iterative incremental clustering of time series
    • Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B̈ohm, K. (eds.) EDBT 2004. Springer, Heidelberg
    • Lin, J., Vlachos, M., Keogh, E., Gunopulos, D.: Iterative incremental clustering of time series. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B̈ohm, K. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 106-122. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2992 , pp. 106-122
    • Lin, J.1    Vlachos, M.2    Keogh, E.3    Gunopulos, D.4
  • 12
    • 84866867881 scopus 로고    scopus 로고
    • ParCube: Sparse parallelizable tensor decompositions
    • Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012, Part I. Springer, Heidelberg
    • Papalexakis, E.E., Faloutsos, C., Sidiropoulos, N.D.: ParCube: Sparse parallelizable tensor decompositions. In: Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012, Part I. LNCS, vol. 7523, pp. 521-536. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7523 , pp. 521-536
    • Papalexakis, E.E.1    Faloutsos, C.2    Sidiropoulos, N.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.