Author:
Cornacchia Alessandro,Bianchi Giuseppe,Bianco Andrea,Giaccone Paolo
Subject
Computer Networks and Communications
Reference32 articles.
1. How can sliding HyperLogLog and EWMA detect port scan attacks in IP traffic?;Chabchoub;EURASIP J. Inf. Secur.,2014
2. FlowFight: High performance–low memory top-k spreader detection;Bruschi;Comput. Netw.,2021
3. Identifying high-cardinality hosts from network-wide traffic measurements;Liu;IEEE Trans. Dependable Secure Comput.,2015
4. Probabilistic counting algorithms for data base applications;Flajolet;J. Comput. System Sci.,1985
5. Loglog counting of large cardinalities;Durand,2003
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Designing Probabilistic Flow Counting over Sliding Windows;2022 IEEE 11th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN);2022-11-08