Understanding and Utilizing the Hierarchy of Abnormal BGP Events
暂无分享,去创建一个
Jun Li | Sheng Zhong | Dejing Dou | Han Qin | Jun Yu Li | Shiwoong Kim | D. Dou | Shiwoong Kim | Han Qin | Sheng Zhong
[1] Arnold Neumaier,et al. Introduction to Numerical Analysis , 2001 .
[2] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[3] Joydeep Ghosh,et al. Automatically learning document taxonomies for hierarchical classification , 2005, WWW '05.
[4] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[5] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[6] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[7] Zhen Wu,et al. BGP routing dynamics revisited , 2007, CCRV.
[8] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[9] Zhen Wu,et al. An internet routing forensics framework for discovering rules of abnormal BGP events , 2005, CCRV.
[10] George Karypis,et al. A Comparison of Document Clustering Techniques , 2000 .
[11] Khalid El-Arini,et al. Bayesian detection of router configuration anomalies , 2005, MineNet '05.
[12] Douglas H. Fisher,et al. Improving Inference through Conceptual Clustering , 1987, AAAI.
[13] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[14] Joan Feigenbaum,et al. Learning-based anomaly detection in BGP updates , 2005, MineNet '05.
[15] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[16] Jennifer G. Dy,et al. A hierarchical method for multi-class support vector machines , 2004, ICML.