Author:
Oh Sang-Hyun,Kang Jin-Suk,Byun Yung-Cheol,Jeong Taikyeong T.,Lee Won-Suk
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Mukherjee, B., Heberlein, T.L., Kevitt, K.N.: Network Intrusion Detection. IEEE Network 8(3), 26–41 (1994)
2. Heady, R., Luger, G., Maccabe, A., Servilla, M.: The Architecture of a Network Level Intrusion Detection System, Technical Report, Computer Science Department, University of New Mexico (August 1990)
3. Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: Proc. of the 1991 IEEE Symposium on Research in Security and Privacy (May 1991)
4. Javitz, H.S., Valdes, A.: The NIDES Statistical Component Description and Justification, Annual report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025 (March 1994)
5. Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: 20th NISSC (October 1997)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. LadderFilter: Filtering Infrequent Items with Small Memory and Time Overhead;Proceedings of the ACM on Management of Data;2023-05-26
2. SHE: A Generic Framework for Data Stream Mining over Sliding Windows;Proceedings of the 51st International Conference on Parallel Processing;2022-08-29
3. A Sketch Framework for Approximate Data Stream Processing in Sliding Windows;IEEE Transactions on Knowledge and Data Engineering;2022
4. Sliding Sketches: A Framework using Time Zones for Data Stream Processing in Sliding Windows;Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining;2020-07-06