Author:
Sheluhin O. I.,Kazhemskiy M. A.
Subject
Signal Processing,Control and Systems Engineering,Software
Reference22 articles.
1. Ahmed, M., Mahmood, A.N., and Hu, J., A survey of network anomaly detection techniques, J. Network Comput. Appl., 2016, vol. 60, pp. 19–31.
2. Acemoglu, D., Malekian, A., and Ozdaglar, A., Network security and contagion, J. Econ. Theory, 2016, vol. 166, pp. 536–585.
3. Witten, I.H., Frank, E., Hall, M.A., and Pal, C.J., Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 2016.
4. Luo, X., Chan, E., and Chang, R., Vanguard: A new detection scheme for a class of TCP targeted denial-of-service attacks, EURASIP J. Adv. Signal Process., 2009, vol. 2009.
5. Chandola, V., Banerjee, A., and Kumar, V., Anomaly detection for discrete sequences: A survey, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 5.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献