Author:
Thottan Marina,Liu Guanglei,Ji Chuanyi
Reference61 articles.
1. Ahmed T., Coates M., Lakhina A.: Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares. Proc. of 26th IEEE International Conference on Computer Communications (2007)
2. Ahmed T., Oreshkin B., Coates M.: Machine Learning Approaches to Network Anomaly Detection. Proc. of International Measurement Conference (2007)
3. Andersen D., Feamster N., Bauer S., Balaskrishman H.: Topology inference from BGP routing dynamics. Proc. SIGCOM Internet Measurements Workshop, Marseille, France (2002)
4. Androulidakis G., Papavassiliou S.: Improving Network Anomaly Detection via Selective Flow-Based Sampling. Communications, IET. Vol. 2, no. 3, 399–409 (2008)
5. Barford P., Kline J., Plonka D., Ron A.: A Signal Analysis of Network Traffic Anomalies. Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurements, 71–82 (2002)
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated Testing of Networked Systems Reliability;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
2. Anomaly Detection in Voice Conversations Through Spectral Features;2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS);2024-07-10
3. DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. A Contribution to DDoS Attack Detection Based on Deep Neural Networks;2023 IEEE 23rd International Symposium on Computational Intelligence and Informatics (CINTI);2023-11-20
5. Community deception in directed influence networks;Social Network Analysis and Mining;2023-09-25