Multi-level anomaly detection: Relevance of big data analytics in networks
暂无分享,去创建一个
Saad Y. Sait | HEMA A MURTHY | SAAD Y SAIT | AKSHAY BHANDARI | SHREYA KHARE | CYRIAC JAMES | H. Murthy | Shreya Khare | Akshay Bhandari | Cyriac James | S. Y. Sait
[1] Hema A. Murthy,et al. Systematic downloading: Analysis and detection , 2014, 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS).
[2] Reza Azmi,et al. MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..
[3] Hema A. Murthy,et al. URL classification using non negative matrix factorization , 2014, 2014 Twentieth National Conference on Communications (NCC).
[4] Hema A. Murthy,et al. Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[5] F. Martinelli,et al. MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.
[6] Amir-Hossein Jahangir,et al. Entropy based SYN flooding detection , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[7] Chandan Srivastava,et al. Support Vector Data Description , 2011 .
[8] Timothy A. Gonsalves,et al. Feature Selection for Text Classification Based on Gini Coefficient of Inequality , 2010, FSDM.
[9] Min Sik Kim,et al. Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition , 2010, 2010 IEEE International Conference on Communications.
[10] Timothy A. Gonsalves,et al. Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique , 2010, 2010 National Conference On Communications (NCC).
[11] Hema A Murthy,et al. Internet activity analysis through proxy log , 2010, 2010 National Conference On Communications (NCC).
[12] Brian D. Davison,et al. Web page classification: Features and algorithms , 2009, CSUR.
[13] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[14] Zhijing Liu,et al. A Novel Approach to Naive Bayes Web Page Automatic Classification , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.
[15] Ferenc Szidarovszky,et al. Multi-Level Intrusion Detection System (ML-IDS) , 2008, 2008 International Conference on Autonomic Computing.
[16] Michael W. Berry,et al. Algorithms and applications for approximate nonnegative matrix factorization , 2007, Comput. Stat. Data Anal..
[17] Samer Hassan,et al. Random-Walk Term Weighting for Improved Text Classification , 2007, ICSC.
[18] Shi-Chung Chang,et al. Time-of-day Internet-access management by combining empirical data-based pricing with quota-based priority control , 2007, IET Commun..
[19] Christina Lioma,et al. Random walk term weighting for information retrieval , 2007, SIGIR.
[20] Timothy A. Gonsalves,et al. Detection of Syn Flooding Attacks using Linear Prediction Analysis , 2006, 2006 14th IEEE International Conference on Networks.
[21] Rada Mihalcea,et al. Random-Walk Term Weighting for Improved Text Classification , 2006, International Conference on Semantic Computing (ICSC 2007).
[22] Qingtao Wu,et al. Network Anomaly Detection Using Time Series Analysis , 2005, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05).
[23] Asok Ray,et al. Symbolic time series analysis for anomaly detection: A comparative evaluation , 2005, Signal Process..
[24] Yuting Zhang,et al. Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[25] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[26] Shi-Chung Chang,et al. Management of abusive and unfair Internet access by quota-based priority control , 2004, Comput. Networks.
[27] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[28] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[29] Qiang Chen,et al. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data , 2003, IEEE Trans. Reliab..
[30] Kang G. Shin,et al. SYN-dog: sniffing SYN flooding sources , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[31] Anurag Kumar,et al. Nonintrusive TCP connection admission control for bandwidth management of an Internet access link , 2000, IEEE Commun. Mag..
[32] Marina Thottan,et al. Proactive anomaly detection using distributed intelligent agents , 1998, IEEE Netw..
[33] Martin F. Porter,et al. An algorithm for suffix stripping , 1997, Program.
[34] Takashi Okuda,et al. Computational intelligence for distributed fault management in networks using fuzzy cognitive maps , 1996, Proceedings of ICC/SUPERCOMM '96 - International Conference on Communications.
[35] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[36] V. Paxson,et al. Wide-area traffic: the failure of Poisson modeling , 1994, SIGCOMM.
[37] M. Taqqu,et al. On the self-similar nature of Ethernet traffic (extended version) , 1994, TNET.
[38] K. K. Paliwal,et al. On the use of line spectral frequency parameters for speech recognition , 1992, Digit. Signal Process..
[39] T. Landauer,et al. Latent semantic analysis , 2008, Scholarpedia.
[40] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[41] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[42] Thomas A. Paine,et al. Directing Traffic: Managing Internet Bandwidth Fairly. , 2008 .
[43] Ben Choi,et al. Web Page Classification , 2005 .
[44] Tsau Young Lin,et al. Foundations and Advances in Data Mining , 2005 .
[45] Robert P. W. Duin,et al. Support Vector Data Description , 2004, Machine Learning.
[46] H. Sebastian Seung,et al. Algorithms for Non-negative Matrix Factorization , 2000, NIPS.
[47] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[48] Walter Willinger,et al. On the Self-Similar Nature of Ethernet Traffic ( extended version ) , 1995 .
[49] Yi Peng,et al. Network intrusion detection , 1994, IEEE Netw..
[50] C. K. Yuen,et al. Theory and application of digital signal processing , 1975 .