To search, Click below search items.
All Published Papers Search Service
Title
Exploring the Reliability and Robustness of HEAF(2) for Quantifying the Intensity of Long-Range Dependent Network Traffic
Author
Karim Mohammed Rezaul, Vic Grout
Vol. 7 No. 2 pp. 221-229
Keywords
ACF, HEAF(2), LRD, Self-similarity.
On Reducing the Degree of Long-range Dependent Network Traffic Using the CoLoRaDe Algorithm
Vol. 7 No. 4 pp. 80-86
Self-similarity, LRD, ACF, HEAF(2), CoLoRaDe
An Intrusion Detection Technique Based on Change in Hurst Parameter with Application to Network Security
C. M. Akujuobi, N. K. Ampah, Matthew N.O. Sadiku
Vol. 7 No. 5 pp. 55-64
Intrusion detection and prevention, enterprise network, anomaly detection, self-similarity, multi-resolution technique
Uncovering Anomaly Traffic Based on Loss of Self-Similarity Behavior Using Second Order Statistical Model
Mohd Fo¡¯ad Rohani, Mohd Aizaini Maarof, Ali Selamat, Houssain Kettani
Vol. 7 No. 9 pp. 116-122
Anomaly Detection, Loss of Self-Similarity, Second Order Self-Similarity model, Multi-Level Sampling