Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Anomalous Network Packet Detection Using Data Stream Mining"
written by Zachary Miller, William Deitrick, Wei Hu,
published by Journal of Information Security, Vol.2 No.4, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Unsupervised anomaly detection: methods and applications
2022
[2] Analysis of Darknet Traffic for Criminal Activities Detection Using TF-IDF and Light Gradient Boosted Machine Learning Algorithm
2021
[3] Online Anomaly Detection Leveraging Stream-Based Clustering and Real-Time Telemetry
2020
[4] Real-time anomaly detection and mitigation using streaming telemetry in SDN
Turkish Journal of Electrical Engineering & Computer Sciences, 2019
[5] Mobile Agents for Detecting Network Attacks Using Timing Covert Channels.
J. Univers. Comput. Sci., 2019
[6] Anomaly Detection System for Internet Traffic based on TF-IDF and BFR Clustering Algorithms
2019
[7] Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
2019
[8] NEW APPROACH FOR CLASSIFICATION R2L AND U2R ATTACKS IN INTRUSION DETECTION SYSTEM
2018
[9] The use of Histogram Analysis to Support Fast Selection of Predictive Features for Data Stream Mining
2018
[10] Minimal Triangle Area Mahalanobis Distance for Stream Homogeneous Group-based DDoS Classification.
2018
[11] Telemetry-based stream-learning of BGP anomalies
Big-DAMA 2018 Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, 2018
[12] Long Short-Term Memory-Based Recurrent Neural Network Approach for Intrusion Detection
2018
[13] Efficient intrusion detection using machine learning techniques
Journal of Advanced Research in Dynamical and Control Systems, 2018
[14] Outlier detection in the context of data stream mining: survey of approaches and cloud computing case study
2017
[15] Design of anomaly packet detection framework by data mining algorithm for network flow
2017
[16] Multistage process to decrease processing time in intrusion prevention system
2017
[17] Temporal Data Streams for Anomaly Intrusion Detection (Extended Version)
2016
[18] Anomaly Detection in Network Traffic Using Stream Data Mining: Review
2016
[19] A Survey on Outlier Detection in the Context of Stream Mining: Review of Existing Approaches and Recommadations
Intelligent Systems Design and Applications, 2016
[20] Anomalous network packet detection
2015
[21] Statistical analysis on aggregate and flow based traffic features distribution
2015 1st International Conference on Wireless and Telematics (ICWT), 2015
[22] Data mining framework for computer Network security Management
2015
[23] Online Network Intrusion Detection System Using VFDT
S Gore, P Gupta - ijetae.com, 2014
[24] ТЕНДЕНЦИИ РАЗВИТИЯ ТЕХНОЛОГИИ ОБНАРУЖЕНИЯ АНОМАЛИЙ СЕТЕВОГО ТРАФИКА
2014
[25] Anomaly detection system by mining frequent pattern using data mining algorithm from network flow
2014
[26] Online network intrusion detection system using temporal logic and stream data processing
2013
[27] Data Stream Subspace Clustering for Anomalous Network Packet Detection
Journal of Information Security, 2012
[28] Data Stream Subspace Clustering for Anomalous Network Packet Detection.
2012
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top