"Online Detection of Network Traffic Anomalies Using Degree Distributions"
written by Wuzuo WANG, Weidong WU,
published by International Journal of Communications, Network and System Sciences, Vol.3 No.2, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Design and evaluation of a system for network threat signatures generation
Journal of Computational Science, 2017
[2] Deep IP Flow Inspection to Detect beyond Network Anomalies
Computer Communications, 2016
[3] Anomaly Detection in Network Traffic Using Stream Data Mining: Review
2016
[4] Smart grid communication network traffic anomaly detection based on entropy analysis
2016
[5] MINISTÉRIO DA DEFESA EXÉRCITO BRASILEIRO DEPARTAMENTO DE CIÊNCIA E TECNOLOGIA INSTITUTO MILITAR DE ENGENHARIA CURSO DE …
2015
[6] A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks
. IEEE, 2015
[7] System, method and apparatus for classifying digital data
2015
[8] 基于时间序列分析的 DNS 服务器的 DDoS 攻击检测
常州大学学报: 自然科学版, 2015
[9] Computação autonômica aplicada ao diagnóstico e solução de anomalias de redes de computadores
2015
[10] METODOLOGIA PARA CONCEP??O DE TERMINAIS URBANOS DE INTEGRA??O NO TRANSPORTE DE PASSAGEIROS
2015
[11] Comparative Analysis of Anomaly Detection Approaches for IDS
2014
[12] 基于用户社团变化的大型网络异常群体行为检测
西北大学学报: 自然科学版, 2013
[13] 基于用户社团变化的大型网络异常群体行为检测 Detection of group behavior anomalies based on host community change in large-scale network
西北大学学报 (自然科学版), 2013
[14] Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud
arXiv preprint arXiv:1308.6745, 2013
[15] Network Security Monitoring and Analysis based on Big Data Technologies
2013
[16] An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
2012
[17] An Optimum-Path Forest framework for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence, 2012
[18] Analysis of Intrusion Detection System (IDS) in Border Gateway Protocol
2012
[19] Entropy based SYN flooding detection
Local Computer Networks (LCN), 2011 IEEE 36th Conference on, 2011
[20] Intrusion detection system using optimum-path forest
Local Computer Networks (LCN), 2011 IEEE 36th Conference on, 2011
[21] Detection of attackers in services using anomalous host behavior based on traffic flow statistics
2011
[22] Inferindo a fonte eo destino do tráfego anômalo em redes de computadores usando correlação espaço-temporal
2011
[23] Os conflitos na escola de hoje
2011