Detecting and identifying malware: a new signal processing goal
暂无分享,去创建一个
Urbashi Mitra | Antonio Ortega | John Heidemann | Christos Papadopoulos | C. Papadopoulos | J. Heidemann | U. Mitra | A. Ortega
[1] Dina Katabi,et al. Inferring Congestion Sharing and Path Characteristics from Packet Interarrival Times , 2001 .
[2] Robert D. Nowak,et al. Merging logical topologies using end-to-end measurements , 2003, IMC '03.
[3] Anja Feldmann,et al. A non-instrusive, wavelet-based approach to detecting network performance problems , 2001, IMW '01.
[4] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[5] Carsten Lund,et al. An information-theoretic approach to traffic matrix estimation , 2003, SIGCOMM '03.
[6] John S. Heidemann,et al. Identification of Repeated Denial of Service Attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[7] Don Towsley,et al. The use of end-to-end multicast measurements for characterizing internal network behavior , 2000, IEEE Commun. Mag..
[8] Rajesh Krishnan,et al. Using signal processing to analyze wireless data traffic , 2002, WiSE '02.
[9] George Varghese,et al. Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.