-
1
-
-
85015559721
-
-
Apache spark - lightning-fast cluster computing. https://spark.apache.org/ (accessed April 29, 2015)
-
-
-
-
2
-
-
85015548900
-
-
Grid5000. https://www.grid5000.fr (accessed April 29, 2015)
-
-
-
-
3
-
-
84893616493
-
G-dbscan: A GPU accelerated algorithm for density-based clustering
-
Andrade, G., Ramos, G., Madeira, D., Sachetto, R., Ferreira, R., Rocha, L.: G-dbscan: A GPU accelerated algorithm for density-based clustering. Procedia Computer Science, 369–378 (2013)
-
(2013)
Procedia Computer Science
, pp. 369-378
-
-
Andrade, G.1
Ramos, G.2
Madeira, D.3
Sachetto, R.4
Ferreira, R.5
Rocha, L.6
-
4
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
Brauckhoff, D., Tellenbach, B., Wagner, A., May, M., Lakhina, A.: Impact of packet sampling on anomaly detection metrics. In: Proc. of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 159–164 (2006)
-
(2006)
Proc. Of the 6Th ACM SIGCOMM Conference on Internet Measurement
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
5
-
-
84858698273
-
Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
-
Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Computer Communications, 772–783 (2012)
-
(2012)
Computer Communications
, pp. 772-783
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
6
-
-
62949240334
-
Anomaly detection and visualization using fisher discriminant clustering of network entropy
-
November
-
Celenk, M., Conley, T., Willis, J., Graham, J.: Anomaly detection and visualization using fisher discriminant clustering of network entropy. In: Third International Conference on Digital Information Management, pp. 216–220, November 2008
-
(2008)
Third International Conference on Digital Information Management
, pp. 216-220
-
-
Celenk, M.1
Conley, T.2
Willis, J.3
Graham, J.4
-
7
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
ACM
-
Dewaele, G., Fukuda, K., Borgnat, P., Abry, P., Cho, K.: Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Proc. of the 2007 Workshop on Large Scale Attack Defense, pp. 145–152. ACM (2007)
-
(2007)
Proc. Of the 2007 Workshop on Large Scale Attack Defense
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
8
-
-
0008691260
-
-
AAAI Press
-
Ester, M., peter Kriegel, H. S J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226–231. AAAI Press (1996)
-
(1996)
A density-based algorithm for discovering clusters in large spatial databases with noise
, pp. 226-231
-
-
Ester, M.1
Peter Kriegel, H.S.J.2
Xu, X.3
-
9
-
-
0001899154
-
Incremental clustering for mining in a data warehousing environment
-
Ester, M., Kriegel, H.P., Sander, J., Wimmer, M., Xu, X.: Incremental clustering for mining in a data warehousing environment. In: Proc. of the 24rd International Conference on Very Large Data Bases, pp. 323–333 (1998)
-
(1998)
Proc. Of the 24Rd International Conference on Very Large Data Bases
, pp. 323-333
-
-
Ester, M.1
Kriegel, H.P.2
Sander, J.3
Wimmer, M.4
Xu, X.5
-
10
-
-
84908602473
-
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
-
September
-
Fahad, A., Alshatri, N., Tari, Z., Alamri, A., Khalil, I., Zomaya, A., Foufou, S., Bouras, A.: A survey of clustering algorithms for big data: Taxonomy and empirical analysis. IEEE Transactions on Emerging Topics in Computing, 267–279, September 2014
-
(2014)
IEEE Transactions on Emerging Topics in Computing
, pp. 267-279
-
-
Fahad, A.1
Alshatri, N.2
Tari, Z.3
Alamri, A.4
Khalil, I.5
Zomaya, A.6
Foufou, S.7
Bouras, A.8
-
11
-
-
84904497471
-
Hashdoop: A mapreduce framework for network anomaly detection
-
April
-
Fontugne, R., Mazel, J., Fukuda, K.: Hashdoop: a mapreduce framework for network anomaly detection. In: INFOCOM WKSHPS, pp. 494–499, April 2014
-
(2014)
INFOCOM WKSHPS
, pp. 494-499
-
-
Fontugne, R.1
Mazel, J.2
Fukuda, K.3
-
12
-
-
84883373251
-
A hough-transform-based anomaly detector with an adaptive time interval
-
Fontugne, R., Fukuda, K.: A hough-transform-based anomaly detector with an adaptive time interval. SIGAPP Appl. Comput. Rev., 41–51 (2011)
-
(2011)
SIGAPP Appl. Comput. Rev.
, pp. 41-51
-
-
Fontugne, R.1
Fukuda, K.2
-
13
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Gu, Y., McCallum, A., Towsley, D.: Detecting anomalies in network traffic using maximum entropy estimation. In: Proc. of the 5th ACM SIGCOMM Conference on Internet Measurement, pp. 32–32 (2005)
-
(2005)
Proc. Of the 5Th ACM SIGCOMM Conference on Internet Measurement
, pp. 32-36
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
14
-
-
79551647326
-
Evaluation of anomaly detection based on sketch and pca
-
IEEE
-
Kanda, Y., Fukuda, K., Sugawara, T.: Evaluation of anomaly detection based on sketch and pca. In: GLOBECOM 2010, pp. 1–5. IEEE (2010)
-
(2010)
GLOBECOM 2010
, pp. 1-5
-
-
Kanda, Y.1
Fukuda, K.2
Sugawara, T.3
-
15
-
-
67149084291
-
Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering
-
Data
-
Kriegel, H.P., Kroger, P., Zimek, A.: Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering. ACM Trans. Knowl. Discov. Data (2009)
-
(2009)
ACM Trans. Knowl. Discov
-
-
Kriegel, H.P.1
Kroger, P.2
Zimek, A.3
-
16
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Auguest
-
Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: Proc. of ACM SIGCOMM 2004, pp. 219–230, Auguest 2004
-
(2004)
Proc. Of ACM SIGCOMM 2004
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
17
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha, A., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw., 3448–3470 (2007)
-
(2007)
Comput. Netw.
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
18
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proc. of ACM CSS Workshop on Data Mining Applied to Security, pp. 5–8 (2001)
-
(2001)
Proc. Of ACM CSS Workshop on Data Mining Applied to Security
, pp. 5-8
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
19
-
-
48049097950
-
A grid-based clustering algorithm for network anomaly detection
-
November
-
Wei, X., Huang, H., Tian, S.: A grid-based clustering algorithm for network anomaly detection. In: The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007, pp. 104–106, November 2007
-
(2007)
The First International Symposium on Data, Privacy, and E-Commerce, ISDPE 2007
, pp. 104-106
-
-
Wei, X.1
Huang, H.2
Tian, S.3
-
20
-
-
84880533620
-
Shark: SQL and rich analytics at scale
-
Xin, R.S., Rosen, J., Zaharia, M., Franklin, M.J., Shenker, S., Stoica, I.: Shark: SQL and rich analytics at scale. In: Proc. of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 13–24 (2013)
-
(2013)
Proc. Of the 2013 ACM SIGMOD International Conference on Management of Data
, pp. 13-24
-
-
Xin, R.S.1
Rosen, J.2
Zaharia, M.3
Franklin, M.J.4
Shenker, S.5
Stoica, I.6
|