1 |
Matthew R , Tim G , Morley Z M , et al. IP forwarding anomalies and improving their detection using multiple data sources, Greenberg Brian Freeman. In:SIGCOMMˊ04, Portland,Oregon, USA, Aug 2004
|
2 |
Anja F , Albert G , Carsten L , et al. Deriving traffic demands for operational IP networks:methodology and experience. IEEE/ACM Transactions on Networking, 2001,9(3):265~280
|
3 |
Medinaa A , Tafta N , Salamatianc K , et al. traffic matrix estimation existing techniques. In:SIGCOMMˊ02,Pittsburgh, Pittsburgh, Pennsylvania,USA, August 2002
|
4 |
Yin Z , Matthew R , Nick D , et al. Fast accurate computation of large scale IP traffic matrices from link loads. In:SIGMETRICESˊ03, San Diego,California,USA, June 2003
|
5 |
Simon H . Kalman filtering and neural networks. Wiley, 2001
|
6 |
Barford P , Kline J , Plonka D , et al. A signal analysis of network traffic anomalies. In:Proceedings of ACM SIGCOMM Intemet Measurement Workshop, Marseilles,France, November 2002
|
7 |
Soule A , Salamatian K , Taft N . Combining filtering and statistical methods for anomaly detection. In:SIGCOMMˊ05, Berkeley,CA,USA, November 2005
|
8 |
Antoine S , Nicolas L , ShiPhilippewen O , et al. Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Trans Dependable and Secure Computing, 2007,4(1):56~70
|
9 |
Lakhina A , Crovella M , Diot C . Characterization of networkwide anomalies in traffic flows. In:IMC 2004, Taormina,Sicily, Italy October 2004
|
10 |
Benjamin I , Rubinstein P , Nelson B , et al. Stealthy poisoning attacks on PCA-based anomaly detectors. In:SIGMETRICESˊ09, Seattle,USA June 2009
|
11 |
Crovella M , Kolaczyk E . Graph wavelets for spatial traffic analysis. In:INFOCOM 2003, Francisco,California,USA,Mar 2003
|
12 |
Zhang Y , Ge Z , Roughan M , et al. Network anemography. In:IMC 2005,Berkeley, CA,USA,October 2005
|
13 |
Chhabra P , Scott C , Kolaczyk E D , et al. Distributed spatial anomaly detection. In:INFOCOM 2008, Phoenix,USA,April 2008
|
14 |
Werbos P J . Back propagation through time:what does it does and how to do it. Proc IEEE, 1990,78(10):1550~1560
|
15 |
Williams R J , Zipser D . A learning algorithm for continually running fully recurrent neural networks. Neural Computation, 1989,1(2):270~280
|
16 |
Feldkamp L A , Puskorius G V . Training controller for robustness:multistream DEKF. IEEE International Conference on Neural Network, 1994(6):2377~2382
|
17 |
.
|