注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
COMPARATIVE ANALYSIS OF ANOMALLY DETECTION ALGORITHMS
作者: Patrick Kabue
DOI:
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
1
下载资源
0
uonbi.ac.ke
本地加速
暂无可下载资源,当前可以选择系统获取到有开放资源时
通知我
或者直接发起求助
文献求助
参考文章
(17)
1.
Levent Ertöz, Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava, Aysel Ozgur,
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection.
siam international conference on data mining.
pp. 25- 36 ,(2003)
2.
K. M. C. Tan, R. A. Maxion,
Performance Evaluation of Anomaly-Based Detection Mechanisms
School of Computing Science Technical Report Series.
,(2004)
3.
Vinod Yegneswaran, Guofei Gu, Wenke Lee, Martin Fong, Phillip Porras,
BotHunter: detecting malware infection through IDS-driven dialog correlation
usenix security symposium.
pp. 12- ,(2007)
4.
Daniela Brauckhoff,
Network traffic anomaly detection and evaluation
TIK-Schriftenreihe.
,vol. 113, ,(2010) ,
10.3929/ETHZ-A-006032727
5.
Hong Huang, Hajar Brani, Hussein Al-Azzawi,
Network Traffic Anomaly Detection.
arXiv: Cryptography and Security.
,(2014)
6.
Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun,
Traffic Anomaly Detection and Characterization in the Tunisian National University Network
NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems.
pp. 136- 147 ,(2006) ,
10.1007/11753810_12
7.
Leyla Bilge, Tudor Dumitras,
Before we knew it
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12.
pp. 833- 844 ,(2012) ,
10.1145/2382196.2382284
8.
Ciza Thomas, Vishwas Sharma, N. Balakrishnan,
Usefulness of DARPA dataset for intrusion detection system evaluation
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008.
,vol. 6973, ,(2008) ,
10.1117/12.777341
9.
Andrew McCallum, Don Towsley, Yu Gu,
Detecting anomalies in network traffic using maximum entropy estimation
internet measurement conference.
pp. 32- 32 ,(2005) ,
10.5555/1251086.1251118
10.
Matthew V. Mahoney, Philip K. Chan,
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '02.
pp. 376- 385 ,(2002) ,
10.1145/775047.775102
来源期刊
2015 年,
Volume: , Issue: ,
Page:
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...