Fake View Analytics in Online Video Services
暂无分享,去创建一个
[1] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[2] Kavé Salamatian,et al. Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.
[3] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[4] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[5] Weifeng Liu,et al. Adaptive and Learning Systems for Signal Processing, Communication, and Control , 2010 .
[6] Yipeng Zhou,et al. Video Browsing - A Study of User Behavior in Online VoD Services , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[7] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[8] Xizhao Wang,et al. Covariance-Matrix Modeling and Detecting Various Flooding Attacks , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[9] Simon Haykin,et al. Adaptive Signal Detection (Adaptive and Learning Systems for Signal Processing, Communications and Control Series) , 2006 .
[10] Paul Barford,et al. Characteristics of network traffic flow anomalies , 2001, IMW '01.
[11] Fulvio Gini,et al. Adaptive and Learning Systems for Signal Processing, Communications, and Control , 2008 .
[12] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[13] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[14] Soheila Dehghanzadeh,et al. Optimizing Fuzzy K-means for network anomaly detection using PSO , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[15] Yipeng Zhou,et al. Fake View Analytics in Online Video Services , 2013, International Workshop on Network and Operating System Support for Digital Audio and Video.
[16] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[17] Vyas Sekar,et al. Data streaming algorithms for estimating entropy of network traffic , 2006, SIGMETRICS '06/Performance '06.
[18] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[19] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[20] Thorsten Joachims,et al. Making large scale SVM learning practical , 1998 .
[21] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[22] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[23] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[24] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.