[1]
V. Chandola, A. Banerjee, V. Kumar. Anomaly detection for discrete sequences: A survey. IEEE Transactions on Knowledge and Data Engineering, 24(5): 823-839, (2012).
DOI: 10.1109/tkde.2010.235
Google Scholar
[2]
D. Jiang, Z. Xu, Z. Chen, et al., Joint time-frequency sparse estimation of large-scale network traffic, Computer Networks, 55(10): 3533-3547, (2011).
DOI: 10.1016/j.comnet.2011.06.027
Google Scholar
[3]
S. Federico, I. A. Juan, C. Pablo, et al., Anomaly detection in network traffic based on statistical inference and α-stable modeling, IEEE Transactions on Dependable and Secure Computing, 8(4): 494-509, (2011).
DOI: 10.1109/tdsc.2011.14
Google Scholar
[4]
L. Guo, J. Cao, H Yu, L. Li. Path-based routing provisioning with mixed shared protection in WDM mesh networks, Journal of Lightwave Technology, 2006, 24 (3): 1129-1141.
DOI: 10.1109/jlt.2005.863249
Google Scholar
[5]
L. Guo. LSSP: A novel local segment-shared protection for multi-domain optical mesh networks, Computer Communications, 2007, 30 (8): 1794-1801.
DOI: 10.1016/j.comcom.2007.02.010
Google Scholar
[6]
T. Qin, X. Guan, W. Li, et al., Monitoring abnormal network traffic based on blind source separation approach, Journal of Network and Computer Applications, 34 (2011): 1732-1742, (2011).
DOI: 10.1016/j.jnca.2011.06.006
Google Scholar
[7]
D. Jiang, G. Hu, GARCH model-based large-scale IP traffic matrix estimation, IEEE Communications Letters, 13(1): 52-54, (2009).
DOI: 10.1109/lcomm.2008.081271
Google Scholar
[8]
T. Akgül, S. Baykut, M. E. Kantarci, et al., Periodicity-based anomalies in self-similar network traffic flow measurements, IEEE Transactions on Instrumentation and Measurement, 60(4): 1358-1366, (2011).
DOI: 10.1109/tim.2010.2084711
Google Scholar
[9]
G. Thatte, U. Mitra, J. Heidemann, Parametric methods for anomaly detection in aggregate traffic, IEEE Transactions on Networking, 19(2): 512-525, (2011).
DOI: 10.1109/tnet.2010.2070845
Google Scholar
[10]
M. Celenk, T. Conley, J. Willis, et al., Predictive network anomaly detection and visualization, IEEE Transactions on Information Forensics and Security, 5(2): 288-299, (2010).
DOI: 10.1109/tifs.2010.2041808
Google Scholar
[11]
P. Chhabra, C. Scott, E. Kolaczyk, et al., Distributed spatial anomaly detection, in Proc. INFOCOM, Phoenix, AZ, pp.2378-2386, (2008).
Google Scholar
[12]
X. Lijun. Cancellation of harmonic interference by baseline shifting of wavelet packet decomposition coefficients. IEEE Transactions on Signal Processing, 53(1): 222-230, (2005).
DOI: 10.1109/tsp.2004.838954
Google Scholar
[13]
F. Millioz, N. Martin. Circularity of the STFT and spectral kurtosis for time-frequency segmentation in Gaussian environment. IEEE Transactions on Signal Processing, 59(2): 515-524, (2011).
DOI: 10.1109/tsp.2010.2081986
Google Scholar