Author:
Taylor Sandra,Lutfiyya Hanan
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Bykova, M., Ostermann, S., Tjaden, B.: Detecting network intrusions via a statistical analysis. In: Proceedings of the 33rd Southeastern Symposium on System Theory, pp. 309–314 (2001)
2. Carter Hill, R., Griffiths, W.E., Judge, G.G.: Undergraduate Econometrics. John Wiley and Sons, Inc., Chichester (2000)
3. Hood, C., Ji, C.: Probabilistic network fault detection. In: Global telecommunications Conference, 1996: Communications: They key to Global Prosperity, pp. 1872–1876 (1996)
4. Jones, M., Roşu, D., Roşu, M.: CPU Reservations and Time Constraints: Efficient, Predictable Scheduling of Independent Activities. In: Proceedings of the Sixteenth ACM Symposium on Operation Systems Principles, St. Malo, France (October 1997)
5. Maxion, R., Feather, F.: A case study of ethernet anomalies in a distributed computing environment. IEEE Transactions on Reliability 39(4), 433–443 (1990)