has been cited by the following article(s):
[1]
|
A Scalable HPC Insider Threat Monitoring System
|
|
2018 |
|
|
[2]
|
Design and evaluation of a system for network threat signatures generation
|
|
Journal of Computational Science,
2017 |
|
|
[3]
|
Deep IP Flow Inspection to Detect beyond Network Anomalies
|
|
Computer Communications,
2016 |
|
|
[4]
|
Anomaly Detection in Network Traffic Using Stream Data Mining: Review
|
|
2016 |
|
|
[5]
|
Smart grid communication network traffic anomaly detection based on entropy analysis
|
|
2016 |
|
|
[6]
|
MINISTÉRIO DA DEFESA EXÉRCITO BRASILEIRO DEPARTAMENTO DE CIÊNCIA E TECNOLOGIA INSTITUTO MILITAR DE ENGENHARIA CURSO DE …
|
|
2015 |
|
|
[7]
|
A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks
|
|
. IEEE,
2015 |
|
|
[8]
|
System, method and apparatus for classifying digital data
|
|
2015 |
|
|
[9]
|
基于时间序列分析的 DNS 服务器的 DDoS 攻击检测
|
|
常州大学学报: 自然科学版,
2015 |
|
|
[10]
|
Computação autonômica aplicada ao diagnóstico e solução de anomalias de redes de computadores
|
|
2015 |
|
|
[11]
|
METODOLOGIA PARA CONCEP??O DE TERMINAIS URBANOS DE INTEGRA??O NO TRANSPORTE DE PASSAGEIROS
|
|
NULL
2015 |
|
|
[12]
|
Comparative Analysis of Anomaly Detection Approaches for IDS
|
|
2014 |
|
|
[13]
|
基于用户社团变化的大型网络异常群体行为检测
|
|
西北大学学报: 自然科学版,
2013 |
|
|
[14]
|
基于用户社团变化的大型网络异常群体行为检测 Detection of group behavior anomalies based on host community change in large-scale network
|
|
西北大学学报 (自然科学版),
2013 |
|
|
[15]
|
Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud
|
|
arXiv preprint arXiv:1308.6745,
2013 |
|
|
[16]
|
Network Security Monitoring and Analysis based on Big Data Technologies
|
|
2013 |
|
|
[17]
|
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
|
|
2012 |
|
|
[18]
|
An Optimum-Path Forest framework for intrusion detection in computer networks
|
|
Engineering Applications of Artificial Intelligence,
2012 |
|
|
[19]
|
Analysis of Intrusion Detection System (IDS) in Border Gateway Protocol
|
|
NULL
2012 |
|
|
[20]
|
Entropy based SYN flooding detection
|
|
Local Computer Networks (LCN), 2011 IEEE 36th Conference on,
2011 |
|
|
[21]
|
Intrusion detection system using optimum-path forest
|
|
Local Computer Networks (LCN), 2011 IEEE 36th Conference on,
2011 |
|
|
[22]
|
Detection of attackers in services using anomalous host behavior based on traffic flow statistics
|
|
2011 |
|
|
[23]
|
Inferindo a fonte eo destino do tráfego anômalo em redes de computadores usando correlação espaço-temporal
|
|
2011 |
|
|
[24]
|
Os conflitos na escola de hoje
|
|
2011 |
|
|
[25]
|
MINISTÉRIO DA DEFESA EXÉRCITO BRASILEIRO DEPARTAMENTO DE CIÊNCIA E TECNOLOGIA INSTITUTO MILITAR DE ENGENHARIA CURSO DE …
|
|
|
|
|
[1]
|
Deep IP flow inspection to detect beyond network anomalies
Computer Communications,
2017
DOI:10.1016/j.comcom.2016.12.007
|
|
|
[2]
|
Smart grid communication network traffic anomaly detection based on entropy analysis
2016 2nd IEEE International Conference on Computer and Communications (ICCC),
2016
DOI:10.1109/CompComm.2016.7924871
|
|
|
[3]
|
A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks
Information Sciences,
2015
DOI:10.1016/j.ins.2014.09.025
|
|
|
[4]
|
An Optimum-Path Forest framework for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence,
2012
DOI:10.1016/j.engappai.2012.03.008
|
|
|
[5]
|
Intrusion detection system using Optimum-Path Forest
2011 IEEE 36th Conference on Local Computer Networks,
2011
DOI:10.1109/LCN.2011.6115182
|
|
|
[6]
|
Entropy based SYN flooding detection
2011 IEEE 36th Conference on Local Computer Networks,
2011
DOI:10.1109/LCN.2011.6115171
|
|
|
[7]
|
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics
2011 IEEE/IPSJ International Symposium on Applications and the Internet,
2011
DOI:10.1109/SAINT.2011.68
|
|
|