Author:
Rawat Sanjay,Sastry Challa S.
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Abry, P., Veitch, D.: Wavelet Analysis of Long-Range Dependent Traffic. IEEE trans. Inform. Theory 44, 2–15 (1998)
2. Allen, W.H., Marin, G.A.: On the Self-Similarity of Synthetic Traffic for the Evaluation of intrusion Detection Systems. In: Proc. of the IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), Orlando, FL, pp. 242–248 (2003)
3. Bace, R., Mell, P.: NIST Special Publication on Intrusion Detection System. SP800- 31, NIST, Gaithersburg, MD (2001)
4. Barford, P., Plonka, D.: Characteristics of Network Traffic Flow Anomalies. In: Proc. of ACM SIGCOMM Internet Measurement Workshop IMW (2001)
5. Beran, J.: Statistics for Long-Memory Processes. Chapman and Hall, New York (1994)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献