Related references
Note: Only part of the references are listed.Flow-Based Web Application Brute-Force Attack and Compromise Detection
Rick Hofstede et al.
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2017)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Mohammed A. Ambusaidi et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data
Markus Goldstein et al.
PLOS ONE (2016)
Network Anomaly Detection: Methods, Systems and Tools
Monowar H. Bhuyan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Histogram-based traffic anomaly detection
Andreas Kind et al.
IEEE Transactions on Network and Service Management (2010)