Greedy Algorithms for Network Anomaly Detection
暂无分享,去创建一个
[1] Ali A. Ghorbani,et al. Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..
[2] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[3] P. Frossard,et al. Tree-Based Pursuit: Algorithm and Properties , 2006, IEEE Transactions on Signal Processing.
[4] L.L. DeLooze. Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps , 2006, 2006 IEEE Information Assurance Workshop.
[5] Y. C. Pati,et al. Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.
[6] Alberto Dainotti,et al. Wavelet-based Detection of DoS Attacks. , 2006 .
[7] Stéphane Mallat,et al. Matching pursuits with time-frequency dictionaries , 1993, IEEE Trans. Signal Process..
[8] Lukasz Saganowski,et al. Statistical and signal‐based network traffic recognition for anomaly detection , 2012, Expert Syst. J. Knowl. Eng..
[9] Antonio Pescapè,et al. NIS04-1: Wavelet-based Detection of DoS Attacks , 2006, IEEE Globecom 2006.
[10] Joel A. Tropp,et al. Greed is good: algorithmic results for sparse approximation , 2004, IEEE Transactions on Information Theory.
[11] C Miller. Image Sensor Data Base for the DARPA ALV (Defense Advanced Research Projects Agency Autonomous Land Vehicle) Program , 1986 .
[12] M. Elad,et al. $rm K$-SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse Representation , 2006, IEEE Transactions on Signal Processing.