4.6 Article

Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Flow-Based Web Application Brute-Force Attack and Compromise Detection

Rick Hofstede et al.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2017)

Article Computer Science, Hardware & Architecture

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Mohammed A. Ambusaidi et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Multidisciplinary Sciences

A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data

Markus Goldstein et al.

PLOS ONE (2016)

Article Computer Science, Information Systems

Network Anomaly Detection: Methods, Systems and Tools

Monowar H. Bhuyan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Histogram-based traffic anomaly detection

Andreas Kind et al.

IEEE Transactions on Network and Service Management (2010)