Analysis and Detection of Fake Views in Online Video Services
暂无分享,去创建一个
[1] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[2] Thorsten Joachims,et al. Making large scale SVM learning practical , 1998 .
[3] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Weifeng Liu,et al. Adaptive and Learning Systems for Signal Processing, Communication, and Control , 2010 .
[5] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[6] Soheila Dehghanzadeh,et al. Optimizing Fuzzy K-means for network anomaly detection using PSO , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[7] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[8] Laura Schweitzer,et al. Advances In Kernel Methods Support Vector Learning , 2016 .
[9] Xizhao Wang,et al. Covariance-Matrix Modeling and Detecting Various Flooding Attacks , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[10] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[11] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[12] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[13] Paul Barford,et al. Characteristics of network traffic flow anomalies , 2001, IMW '01.
[14] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[15] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[16] Vyas Sekar,et al. Data streaming algorithms for estimating entropy of network traffic , 2006, SIGMETRICS '06/Performance '06.
[17] Yi-Shan Chao,et al. Article 1 , 2019, European Financial Services Law.
[18] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[19] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[20] Kavé Salamatian,et al. Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.
[21] Yipeng Zhou,et al. Fake View Analytics in Online Video Services , 2013, NOSSDAV.
[22] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.