Author:
Chen Shanxiong,Peng Maoling,Xiong Hailing,Wu Sheng
Funder
National Natural Science Foundation of China
Chinese Postdoctoral Science Foundation
Special financial aid to post-doctor research fellow of Chongqing ,the Fundamental Research Funds for the Central Universities
Doctoral Fund of Southwestern University
the project of Scientific and Technological Research Program of Chongqing Municipal Education Commission
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference29 articles.
1. V, C., A, B., V, K.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)
2. Huang, J., Kalbarczyk, Z., Nicol, D.M.: Knowledge Discovery from Big Data for Intrusion Detection Using LDA. In: 2014 IEEE International Congress on Big Data (BigData Congress), pp. 760–761 (2014)
3. Li-ming, Z., Peng, Z., Wei-hong, Z., et al.: Anomaly detection in backbone networks using filter-ary-sketch. J. Commun. 32(12), 151–160 (2011)
4. M, X., S, H., Tian, B., et al.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)
5. Ye-Kui, Q., Ming, C., Li-Xin, Y., et al.: Network-wide anomaly detection method based on multiscale principal component analysis. J. Softw. 23(2), 361–377 (2012)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献