"Anomalous Network Packet Detection Using Data Stream Mining"
written by Zachary Miller, William Deitrick, Wei Hu,
published by Journal of Information Security, Vol.2 No.4, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Anomaly Detection System for Internet Traffic based on TF-IDF and BFR Clustering Algorithms
2019
[2] NEW APPROACH FOR CLASSIFICATION R2L AND U2R ATTACKS IN INTRUSION DETECTION SYSTEM
2018
[3] The use of Histogram Analysis to Support Fast Selection of Predictive Features for Data Stream Mining
2018
[4] Minimal Triangle Area Mahalanobis Distance for Stream Homogeneous Group-based DDoS Classification.
2018
[5] Telemetry-based stream-learning of BGP anomalies
Big-DAMA 2018 Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, 2018
[6] Long Short-Term Memory-Based Recurrent Neural Network Approach for Intrusion Detection
2018
[7] Efficient intrusion detection using machine learning techniques
Journal of Advanced Research in Dynamical and Control Systems, 2018
[8] Outlier detection in the context of data stream mining: survey of approaches and cloud computing case study
2017
[9] Design of anomaly packet detection framework by data mining algorithm for network flow
2017
[10] Multistage process to decrease processing time in intrusion prevention system
2017
[11] Temporal Data Streams for Anomaly Intrusion Detection (Extended Version)
2016
[12] Anomaly Detection in Network Traffic Using Stream Data Mining: Review
2016
[13] A Survey on Outlier Detection in the Context of Stream Mining: Review of Existing Approaches and Recommadations
Intelligent Systems Design and Applications, 2016
[14] Anomalous network packet detection
2015
[15] Statistical analysis on aggregate and flow based traffic features distribution
2015 1st International Conference on Wireless and Telematics (ICWT), 2015
[16] Online Network Intrusion Detection System Using VFDT
S Gore, P Gupta - ijetae.com, 2014
[17] ТЕНДЕНЦИИ РАЗВИТИЯ ТЕХНОЛОГИИ ОБНАРУЖЕНИЯ АНОМАЛИЙ СЕТЕВОГО ТРАФИКА
2014
[18] Online network intrusion detection system using temporal logic and stream data processing
2013
[19] Data Stream Subspace Clustering for Anomalous Network Packet Detection
Journal of Information Security, 2012
[20] Data Stream Subspace Clustering for Anomalous Network Packet Detection.
2012