-
1
-
-
34250761381
-
Integration of mobility and intrusion detection for wireless ad hoc networks
-
Sun B, Wu K, Xiao Y, Wang R. Integration of mobility and intrusion detection for wireless ad hoc networks. International Journal of Communication Systems 2007; 20(6):695-721. DOI: 10.1002/dac.853. Available from: http://dx.doi.org/10.1002/dac.853
-
(2007)
International Journal of Communication Systems
, vol.20
, Issue.6
, pp. 695-721
-
-
Sun, B.1
Wu, K.2
Xiao, Y.3
Wang, R.4
-
2
-
-
39349109412
-
Intrusion detection and tolerance: A global scheme
-
Djemaiel Y, Rekhis S, Boudriga N. Intrusion detection and tolerance: a global scheme. International Journal of Communication Systems 2008; 21(2):211-230. DOI: 10.1002/dac.895. Available from: http://dx.doi.org/10.1002/dac.895
-
(2008)
International Journal of Communication Systems
, vol.21
, Issue.2
, pp. 211-230
-
-
Djemaiel, Y.1
Rekhis, S.2
Boudriga, N.3
-
3
-
-
84860700540
-
Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions
-
Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems 2012; 25(5):672-688. DOI: 10.1002/dac.1289. Available from: http://dx.doi.org/10.1002/dac.1289
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.5
, pp. 672-688
-
-
Chen, R.-M.1
Hsieh, K.-T.2
-
4
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Portland, OR
-
Lakhina A. Diagnosing network-wide traffic anomalies. ACM SIGCOMM, Portland, OR, 2004; 219-230.
-
(2004)
ACM SIGCOMM
, pp. 219-230
-
-
Lakhina, A.1
-
5
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
Taormina, Sicily, Italy
-
Lakhina A, Crovella M, Diot C. Characterization of network-wide anomalies in traffic flows. ACM Internet Measurement Conference, Taormina, Sicily, Italy, 2004; 201-206.
-
(2004)
ACM Internet Measurement Conference
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
7
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
ACM: New York, NY, USA
-
Li X, Bian F, Crovella M, Diot C, Govindan R, Iannaccone G, Lakhina A. Detection and identification of network anomalies using sketch subspaces. In IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. ACM: New York, NY, USA, 2006; 147-152. Available from: http://doi.acm.org/10.1145/1177080. 1177099
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
8
-
-
78649292799
-
A novel multi time-scales PCA-based anomaly detection system
-
Callegari C, Gazzarrini L, Giordano S, Pagano M, Pepe T. A novel multi time-scales PCA-based anomaly detection system. 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Ottawa, Canada, 2010.
-
(2010)
2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Ottawa, Canada
-
-
Callegari, C.1
Gazzarrini, L.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
-
9
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
Shyu M-L, Chen S-C, Sarinnapakorn K, Chang L. A novel anomaly detection scheme based on principal component classifier. IEEE Foundations and New Directions of Data Mining Workshop, in Conjunction with ICDM03, Melbourne, Florida, 2003; 172-179.
-
(2003)
IEEE Foundations and New Directions of Data Mining Workshop, in Conjunction with ICDM03, Melbourne, Florida
, pp. 172-179
-
-
Shyu, M.-L.1
Chen, S.-C.2
Sarinnapakorn, K.3
Chang, L.4
-
10
-
-
8344255864
-
Structural analysis of network traffic flows
-
New York, New York
-
Lakhina A, Papagiannaki K, Crovella M, Diot C, Kolaczyk ED, Taft N. Structural analysis of network traffic flows. ACM SIGMETRICS, New York, New York, 2004; 61-72.
-
(2004)
ACM SIGMETRICS
, pp. 61-72
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.D.5
Taft, N.6
-
11
-
-
36349029177
-
Sensitivity of PCA for traffic anomaly detection
-
Ringberg H, Soule A, Rexford J, Diot C. Sensitivity of PCA for traffic anomaly detection. ACM SIGMETRICS Performance Evaluation Review 2007; 35(1):109-120. Available from: http://doi.acm.org/10.1145/1269899. 1254895
-
(2007)
ACM SIGMETRICS Performance Evaluation Review
, vol.35
, Issue.1
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
12
-
-
33750949942
-
Identifying intrusions in computer networks with principal component analysis
-
DC, USA
-
Wang W, Battiti R. Identifying intrusions in computer networks with principal component analysis. In ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security. IEEE Computer Society: Washington, DC, USA, 2006; 270-279. Available from: http://dx.doi.org/10.1109/ARES.2006.73
-
(2006)
ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security IEEE Computer Society: Washington
, pp. 270-279
-
-
Wang, W.1
Battiti, R.2
-
13
-
-
84911985823
-
-
3ème conférence sur la sécurité et architectures réseaux La Londe France juin RSM-Dépt. Réseaux Sécurité et Multimédia (Institut Télécom-Télécom Bretagne), La Londe, France;
-
Bouzida Y, Cuppens F, Cuppens-Boulahia N, Gombault S. Efficient intrusion detection using principal component analysis. 3ème conférence sur la sécurité et architectures réseaux, La Londe, France, juin, RSM-Dépt. Réseaux, Sécurité et Multimédia (Institut Télécom-Télécom Bretagne), La Londe, France; 2004.
-
(2004)
Efficient Intrusion Detection Using Principal Component Analysis
-
-
Bouzida, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Gombault, S.4
-
14
-
-
21144450811
-
A novel intrusion detection method based on principal component analysis
-
Wang W, Guan X, Zhang X. A novel intrusion detection method based on principal component analysis. Computer Security, Advances in Neural Networks, International IEEE Symposium on Neural Networks, Lecture, Dalian, China, 2004; 657-662.
-
(2004)
Computer Security, Advances in Neural Networks, International IEEE Symposium on Neural Networks, Lecture, Dalian, China
, pp. 657-662
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
15
-
-
67949109641
-
Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (M3L) PCA-based approach
-
Chatzigiannakis V, Papavassiliou S, Androulidakis G. Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (M3L) PCA-based approach. Security and Communication Networks 2009; 2(3):289-304.
-
(2009)
Security and Communication Networks
, vol.2
, Issue.3
, pp. 289-304
-
-
Chatzigiannakis, V.1
Papavassiliou, S.2
Androulidakis, G.3
-
16
-
-
14844367057
-
An improved data stream summary: The count-min sketch and its applications
-
Cormode G, Muthukrishnan S. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms 2005; 55(1):58-75. DOI: 10.1016/j.jalgor.2003.12.001. Available from: http://www.sciencedirect.com/science/article/B6WH3-4BM8Y1G-1/2/71b7980bb85b570bc57ee73f8afcd62f
-
(2005)
Journal of Algorithms
, vol.55
, Issue.1
, pp. 58-75
-
-
Cormode, G.1
Muthukrishnan, S.2
-
17
-
-
1842435123
-
Tabulation based 4-universal hashing with applications to second moment estimation
-
Society for Industrial and Applied Mathematics: Philadelphia, PA, USA
-
Thorup M, Zhang Y. Tabulation based 4-universal hashing with applications to second moment estimation. In SODA '04: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 2004; 615-624.
-
(2004)
SODA '04: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 615-624
-
-
Thorup, M.1
Zhang, Y.2
-
19
-
-
84911987275
-
-
Flow-Tools Home Page
-
Flow-Tools Home Page. Available from: http://www.ietf.org/rfc/rfc3954.txt
-
-
-
-
20
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann R, Haines J, Fried D, Korba J, Das K. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 2000; 34(4):579-595.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
22
-
-
84911988656
-
-
The Internet2 Network
-
The Internet2 Network. Available from: http://www.internet2.edu/network/
-
-
-
|