Expansion of Matching Pursuit Methodology for Anomaly Detection in Computer Networks
暂无分享,去创建一个
Tomasz Andrysiak | Rafał Renk | Łukasz Saganowski | Michał Choraś | M. Choraś | T. Andrysiak | Ł. Saganowski | R. Renk
[1] P. Frossard,et al. Tree-Based Pursuit: Algorithm and Properties , 2006, IEEE Transactions on Signal Processing.
[2] Ali A. Ghorbani,et al. Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..
[3] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[4] Edward A. Lee,et al. Adaptive Signal Models: Theory, Algorithms, and Audio Applications , 1998 .
[5] Lori L. DeLooze,et al. Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.
[6] L.L. DeLooze. Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps , 2006, 2006 IEEE Information Assurance Workshop.
[7] Luigi Coppolino,et al. Exploiting diversity and correlation to improve the performance of intrusion detection systems , 2009, 2009 International Conference on Network and Service Security.
[8] Jan Wessnitzer,et al. A Model of Non-elemental Associative Learning in the Mushroom Body Neuropil of the Insect Brain , 2007, ICANNGA.
[9] Joel A. Tropp,et al. Greed is good: algorithmic results for sparse approximation , 2004, IEEE Transactions on Information Theory.
[10] S. Mallat,et al. Adaptive greedy approximations , 1997 .
[11] Dennis Gabor,et al. Theory of communication , 1946 .
[12] Stéphane Mallat,et al. Matching pursuits with time-frequency dictionaries , 1993, IEEE Trans. Signal Process..
[13] C Miller. Image Sensor Data Base for the DARPA ALV (Defense Advanced Research Projects Agency Autonomous Land Vehicle) Program , 1986 .
[14] Balas K. Natarajan,et al. Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..
[15] Lukasz Saganowski,et al. Statistical and signal‐based network traffic recognition for anomaly detection , 2012, Expert Syst. J. Knowl. Eng..
[16] Michael M. Goodwin,et al. Adaptive Signal Models , 1998 .
[17] S. Muthukrishnan,et al. Approximation of functions over redundant dictionaries using coherence , 2003, SODA '03.
[18] Lukasz Saganowski,et al. A Novel Signal-Based Approach to Anomaly Detection in IDS Systems , 2009, ICANNGA.