Network anomaly detection based on adaptive approximation of signals
暂无分享,去创建一个
[1] Lukasz Saganowski,et al. Statistical and signal‐based network traffic recognition for anomaly detection , 2012, Expert Syst. J. Knowl. Eng..
[2] H. T. Kung,et al. Use of spectral analysis in defense against DoS attacks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[3] Ali A. Ghorbani,et al. Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..
[4] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[5] Michael Elad,et al. Sparse and Redundant Representations - From Theory to Applications in Signal and Image Processing , 2010 .
[6] Philippe Owezarski,et al. Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies , 2007, IEEE Transactions on Dependable and Secure Computing.
[7] P. Frossard,et al. Tree-Based Pursuit: Algorithm and Properties , 2006, IEEE Transactions on Signal Processing.
[8] Maria Papadaki,et al. The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset , 2008, TrustBus.
[9] Simon Pietro Romano,et al. Real Time Detection of Novel Attacks by Means of Data Mining Techniques , 2005, ICEIS.
[10] Gyungho Lee,et al. DDoS Attack Detection and Wavelets , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).
[11] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[12] Joel A. Tropp,et al. Greed is good: algorithmic results for sparse approximation , 2004, IEEE Transactions on Information Theory.
[13] Norbik Bashah Idris,et al. Hybrid Intrusion Detection Systems (HIDS) using Fuzzy Logic , 2011 .
[14] Anja Feldmann,et al. A non-instrusive, wavelet-based approach to detecting network performance problems , 2001, IMW '01.
[15] A. Janssen. Gabor representation of generalized functions , 1981 .
[16] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[17] Alberto Dainotti,et al. Wavelet-based Detection of DoS Attacks. , 2006 .
[18] Rémi Gribonval,et al. Fast matching pursuit with a multiscale dictionary of Gaussian chirps , 2001, IEEE Trans. Signal Process..
[19] Dennis Gabor,et al. Theory of communication , 1946 .