Author:
Kim Sung-ju,Kim Byung Chul,Lee Jae Yong
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Kulkarni, A., Bush, S.: Detecting Distributed Denial-of-Service Attacks Using Kolmogoriv Complexity Metrics. Journal of Network and Systems Management 14(1), 69–80 (2006)
2. Lee, W., Stolfo, S.J.: Data Mining Approaches for Intrusion Detection. In: Proc. of the 7th USENIX Security Symposium, pp. 79–84 (January 1998)
3. Broder, A., Mitzenmacher, M.: Network Applications of Bloom Filters. Internet Mathematics 1(4), 485–509 (2003)
4. Lu, W., Traore, I.: A novel unsupervised anomaly detection framework for detecting network attacks in real-time. In: 4th International Conference on Cryptology and Network Security, China (December 2005)
5. Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. Kluwer (2002)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献