Atypicality for vector Gaussian models
暂无分享,去创建一个
[1] Ioannis Ch. Paschalidis,et al. Spatio-temporal network anomaly detection by assessing deviations of empirical measures , 2009, IEEE/ACM Trans. Netw..
[2] A. Nies. Computability and randomness , 2009 .
[3] G. Smaragdakis,et al. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures , 2009, IEEE/ACM Transactions on Networking.
[4] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Mohammad Zulkernine,et al. Information-Theoretic Detection of SQL Injection Attacks , 2012, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering.
[6] E. S. Pearson,et al. ON THE USE AND INTERPRETATION OF CERTAIN TEST CRITERIA FOR PURPOSES OF STATISTICAL INFERENCE PART I , 1928 .
[7] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[8] Hyoung-Kee Choi,et al. Effective discovery of attacks using entropy of packet dynamics , 2009, IEEE Network.
[9] J. Rissanen. A UNIVERSAL PRIOR FOR INTEGERS AND ESTIMATION BY MINIMUM DESCRIPTION LENGTH , 1983 .
[10] T. Y. Lin,et al. Kolmogorov complexity based automata modeling for intrusion detection , 2005, 2005 IEEE International Conference on Granular Computing.
[11] Nan Wang,et al. An Anomaly Detection Algorithm Based on Lossless Compression , 2012, 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage.
[12] Lorie M. Liebrock,et al. An application of information theory to intrusion detection , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).
[13] Anders Høst-Madsen,et al. Atypical information theory for real-valued data , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[14] G.J. Saulnier,et al. Minimum description length principles for detection and classification of FTP exploits , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[15] Peter Elias,et al. Universal codeword sets and representations of the integers , 1975, IEEE Trans. Inf. Theory.
[16] Wanlei Zhou,et al. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.
[17] Feng Pan,et al. Anomaly detection based-on the regularity of normal behaviors , 2006, 2006 1st International Symposium on Systems and Control in Aerospace and Astronautics.
[18] Anders Høst-Madsen,et al. Information theory for atypical sequences , 2013, 2013 IEEE Information Theory Workshop (ITW).
[19] Ming Li,et al. An Introduction to Kolmogorov Complexity and Its Applications , 2019, Texts in Computer Science.
[20] Ioan Tabus,et al. Sparse Modeling for Lossless Audio Compression , 2013, IEEE Transactions on Audio, Speech, and Language Processing.