-
1
-
-
35348821984
-
Web page revisitation revisited: Implications of a long-term click-stream study of browser usage
-
San Jose, California, USA
-
H. Obendorf, H. Weinreich, E. Herder, and M. Mayer, "Web Page Revisitation Revisited: Implications of a Long-term Click-stream Study of Browser Usage," in In proceedings of CHI '07, San Jose, California, USA, 2007, pp. 597-606.
-
(2007)
Proceedings of CHI ' 07
, pp. 597-606
-
-
Obendorf, H.1
Weinreich, H.2
Herder, E.3
Mayer, M.4
-
2
-
-
77954646988
-
A characterization of online browsing behavior
-
Raleigh, North Carolina, USA
-
R. Kumar and A. Tomkins, "A Characterization of Online Browsing Behavior," in World Wide Web, Raleigh, North Carolina, USA, 2010, pp. 561-570.
-
(2010)
World Wide Web
, pp. 561-570
-
-
Kumar, R.1
Tomkins, A.2
-
3
-
-
84967196672
-
-
Aug.
-
J. Lewis. (2012, Aug.) Forbes.com. [Online]. http://www.forbes.com/sites/ciocentral/2012/05/08/figuring-ddos-attackrisks-into-it-security-budgets/
-
(2012)
Forbes.com
-
-
Lewis, J.1
-
4
-
-
84924739181
-
-
Arbor Networks Whitepaper 2012. [Online]. Arbor Networks, "The Growing Threat of Application-Layer DDoS Attacks", Whitepaper
-
"The Growing Threat of Application-Layer DDoS Attacks," Arbor Networks Whitepaper, 2012. [Online]. Arbor Networks, "The Growing Threat of Application-Layer DDoS Attacks", Whitepaper, 2012.
-
(2012)
The Growing Threat of Application-Layer DDoS Attacks
-
-
-
5
-
-
84924949069
-
-
(2010 Nov.) OWASP
-
W. O. Chee. (2010, Nov.) OWASP. [Online]. https://www.owasp.org/images/4/43/Layer-7-DDOS.pdf
-
-
-
Chee, W.O.1
-
6
-
-
84924949068
-
-
(2012, May) User-agent-string.info
-
(2012, May) User-agent-string.info. [Online]. http://user-agentstring. info/
-
-
-
-
7
-
-
84869385976
-
Detection of malicious and nonmalicious website visitors using unsupervised neural network learning
-
Jan
-
D. Stevanovic, N. Vlajic, and A. An, "Detection of Malicious and Nonmalicious Website Visitors Using Unsupervised Neural Network Learning," Applied Soft Computing, vol. 13, no. 1, pp. 698-708, Jan. 2013.
-
(2013)
Applied Soft Computing
, vol.13
, Issue.1
, pp. 698-708
-
-
Stevanovic, D.1
Vlajic, N.2
An, A.3
-
8
-
-
80053144966
-
Exploiting cloud utility models for profit and ruin
-
Washington, DC
-
J. Idziorek and M. Tannian, "Exploiting Cloud Utility Models for Profit and Ruin," in IEEE 4th International Conference on Cloud Computing, Washington, DC, 2011, pp. 33-40.
-
(2011)
IEEE 4th International Conference on Cloud Computing
, pp. 33-40
-
-
Idziorek, J.1
Tannian, M.2
-
9
-
-
84866747256
-
Attribution of fraudulent resource consumption in the cloud
-
Honolulu, Hawaii
-
J. Idziorek, M. Tannian, and D. Jacobson, "Attribution of Fraudulent Resource Consumption in the Cloud," in IEEE Fifth International Conference on Cloud Computing, Honolulu, Hawaii, 2012, pp. 99-106.
-
(2012)
IEEE Fifth International Conference on Cloud Computing
, pp. 99-106
-
-
Idziorek, J.1
Tannian, M.2
Jacobson, D.3
-
10
-
-
84924949067
-
Evading DDoS detection with mimicry attacks
-
Enschede, Netherlands
-
M. Rijke, "Evading DDoS detection with mimicry attacks," in 17th Twente Student Conference on IT, Enschede, Netherlands, 2012.
-
(2012)
17th Twente Student Conference on IT
-
-
Rijke, M.1
-
12
-
-
84924949066
-
-
M. Bolanos, J. Forrest, and M. Hahsler, "Introduction to stream: An extensible Framework for Data Stream Clustering Research with R," in , 2011, pp. 1-33.
-
(2011)
Introduction to Stream: An Extensible Framework for Data Stream Clustering Research with R
, pp. 1-33
-
-
Bolanos, M.1
Forrest, J.2
Hahsler, M.3
-
13
-
-
79957822668
-
Continuous monitoring of distance-based outliers over data streams
-
Hannover, Germany
-
M. Kontaki, A. Gounaris, A. N. Papadopoulos, K. Tsichlas, and Y. Manolopoulos, "Continuous monitoring of distance-based outliers over data streams," in The IEEE International Conference on Data Engineering (ICDE), Hannover, Germany, 2011, pp. 135-146.
-
(2011)
The IEEE International Conference on Data Engineering (ICDE)
, pp. 135-146
-
-
Kontaki, M.1
Gounaris, A.2
Papadopoulos, A.N.3
Tsichlas, K.4
Manolopoulos, Y.5
-
14
-
-
34548752457
-
Incremental local outlier detection for data streams
-
Honolulu, Hawaii, USA
-
D. Pokrajac, A. Lazarevic, and L. J. Latecki, "Incremental Local Outlier Detection for Data Streams," in IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Honolulu, Hawaii, USA, 2007, pp. 504-515.
-
(2007)
IEEE Symposium on Computational Intelligence and Data Mining (CIDM)
, pp. 504-515
-
-
Pokrajac, D.1
Lazarevic, A.2
Latecki, L.J.3
-
15
-
-
33745434639
-
Density-based clustering over an evolving data stream with noise
-
Bethesda, Maryland, USA
-
F. Cao, M. Ester, W. Qian, and A. Zhou, "Density-based clustering over an evolving data stream with noise," in In Proceedings of the 6th SIAM International Conference on Data Mining, Bethesda, Maryland, USA, 2006, pp. 328-339.
-
(2006)
Proceedings of the 6th SIAM International Conference on Data Mining
, pp. 328-339
-
-
Cao, F.1
Ester, M.2
Qian, W.3
Zhou, A.4
-
16
-
-
36849092449
-
Density-based clustering for real-ime stream data
-
New York, NY
-
Y. Chen and L. Tu, "Density-based clustering for real-ime stream data," in KDD'07, New York, NY, 2007, pp. 133-142.
-
(2007)
KDD'07
, pp. 133-142
-
-
Chen, Y.1
Tu, L.2
-
17
-
-
84893276616
-
On density-based data streams clustering algorithms: A survey
-
Jan
-
A. Amini, T. Y. Wah, and H. Saboohi, "On Density-Based Data Streams Clustering Algorithms: A Survey," Computer Science and Technology, vol. 29, no. 1, pp. 116-141, Jan. 2014.
-
(2014)
Computer Science and Technology
, vol.29
, Issue.1
, pp. 116-141
-
-
Amini, A.1
Wah, T.Y.2
Saboohi, H.3
-
18
-
-
0242456797
-
ADMIT: Anomaly-based data mining for intrusions
-
New York, NY
-
K. Sequeira and M. Zaki, "ADMIT: anomaly-based data mining for intrusions," in In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, 2002, pp. 386-395.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 386-395
-
-
Sequeira, K.1
Zaki, M.2
-
19
-
-
67049142361
-
Comparative evaluation of anomaly detection techniques for sequence data
-
Pisa, Italy
-
V. Chandola, V. Mithal, and V. Kumar, "Comparative Evaluation of Anomaly Detection Techniques for Sequence Data ," in In Proceedings of the 8th IEEE International Conference on Data Mining, Pisa, Italy, 2008, pp. 743-748.
-
(2008)
Proceedings of the 8th IEEE International Conference on Data Mining
, pp. 743-748
-
-
Chandola, V.1
Mithal, V.2
Kumar, V.3
-
20
-
-
67049085174
-
Anomaly detection in large sets of high-dimensional symbol sequences
-
Technical Report . NASA TM-
-
S. Budalakoti, A. Srivastava, R. Akella, and E. Turkov, "Anomaly detection in large sets of high-dimensional symbol sequences," NASA Ames Research Center, Technical Report . NASA TM-2006-2145, 2006.
-
(2006)
NASA Ames Research Center
, pp. 2006-2145
-
-
Budalakoti, S.1
Srivastava, A.2
Akella, R.3
Turkov, E.4
-
21
-
-
77953527363
-
Moa: Massive online analysis
-
Apr
-
A. Bifet, G. Holmes, R. Kirkby, and B. Pfahringer, "MOA: Massive Online Analysis," Journal of Machine Learning Research, vol. 11, pp. 1601-1604, Apr. 2010.
-
(2010)
Journal of Machine Learning Research
, vol.11
, pp. 1601-1604
-
-
Bifet, A.1
Holmes, G.2
Kirkby, R.3
Pfahringer, B.4
-
23
-
-
84867147707
-
Smart crawlers for flash-crowd ddos: The attacker's perspective
-
Guelph, Canada
-
D. Drinfeld and N. Vlajic, "Smart Crawlers for Flash-Crowd DDoS: The Attacker's Perspective," in IEEE World Congress on Internet Security, Guelph, Canada, 2012, pp. 37-44.
-
(2012)
IEEE World Congress on Internet Security
, pp. 37-44
-
-
Drinfeld, D.1
Vlajic, N.2
-
24
-
-
74549182696
-
Loop: Local outlier probabilities
-
H. P. Kriegel, P. Krer, E. Schubert, and A. Zimek, "LoOP: Local Outlier Probabilities," in In the Proceedings of the 18th ACM conference on Information and knowledge management, 2009, p. 1649-1652.
-
(2009)
The Proceedings of the 18th ACM Conference on Information and Knowledge Management
, pp. 1649-1652
-
-
Kriegel, H.P.1
Krer, P.2
Schubert, E.3
Zimek, A.4
|