Fault detection in an Ethernet network using anomaly signature matching
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Schemes for fault identification in communication networks
IEEE/ACM Transactions on Networking (TON)
Internet traffic characterization
Internet traffic characterization
IEEE/ACM Transactions on Networking (TON)
Measurements and analysis of end-to-end Internet dynamics
Measurements and analysis of end-to-end Internet dynamics
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proactive Network Fault Detection
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Measurements of Wide Area Internet TraffiC
Measurements of Wide Area Internet TraffiC
FlowScan: A Network Traffic Flow Reporting and Visualization Tool
LISA '00 Proceedings of the 14th USENIX conference on System administration
Aberrant Behavior Detection in Time Series for Network Monitoring
LISA '00 Proceedings of the 14th USENIX conference on System administration
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Wavelet analysis of long-range-dependent traffic
IEEE Transactions on Information Theory
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
A signal analysis of network traffic anomalies
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Experiences with worm propagation simulations
Proceedings of the 2003 ACM workshop on Rapid malcode
Sketch-based change detection: methods, evaluation, and applications
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
Towards multisensor data fusion for DoS detection
Proceedings of the 2004 ACM symposium on Applied computing
Accurate, scalable in-network identification of p2p traffic using application signatures
Proceedings of the 13th international conference on World Wide Web
Understanding web server configuration issues
Software—Practice & Experience - Special issue: Web technologies
Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Flash crowd mitigation via adaptive admission control based on application-level observations
ACM Transactions on Internet Technology (TOIT)
A cross-correlation-based method for spatial-temporal traffic analysis
Performance Evaluation - Long range dependence and heavy tail distributions
Monitoring the Macroscopic Effect of DDoS Flooding Attacks
IEEE Transactions on Dependable and Secure Computing
FCAN: Flash Crowds Alleviation Network
Proceedings of the 2006 ACM symposium on Applied computing
Application of a network dynamics analysis tool to mobile ad hoc networks
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
One step ahead to multisensor data fusion for DDoS detection
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Is sampled data sufficient for anomaly detection?
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Combining filtering and statistical methods for anomaly detection
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Passive measurement of one-way and two-way flow lifetimes
ACM SIGCOMM Computer Communication Review
Challenging the anomaly detection paradigm: a provocative discussion
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Traffic flooding attack detection with SNMP MIB using SVM
Computer Communications
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions
Information Networking. Towards Ubiquitous Networking and Services
Information fusion for computer security: State of the art and open issues
Information Fusion
A modeling framework of content pollution in Peer-to-Peer video streaming systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Network anomaly detection and classification via opportunistic sampling
IEEE Network: The Magazine of Global Internetworking - Special issue title on recent developments in network intrusion detection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Baseline traffic modeling for anomalous traffic detection on network transit points
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Going viral: flash crowds in an open CDN
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Anomaly detection of excessive network traffic based on ratio and volume analysis
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Traffic anomaly detection and characterization in the tunisian national university network
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Network intrusion detection using wavelet analysis
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
Measurement and modeling of paging channel overloads on a cellular network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |