A novel spectrum occupancy anomaly detection method based on time series analysis theory

W Lei, X Shuguo - 2012 IEEE International Workshop on …, 2012 - ieeexplore.ieee.org
Efficient spectrum management and dynamic spectrum access networks heavily rely on
accurate statistics of spectrum utilization and temporal behaviour modelling of spectrum …

Research for scan detection algorithm of high-speed links based on honeypot

X Wang, F Liu, LY Chen, Z Lei - 2010 2nd IEEE …, 2010 - ieeexplore.ieee.org
In order to effectively detect the scan attack on high-speed links, this paper improves the
commonly used scan detection algorithm TRW (Threshold Random Walk) based on …

Research on anomaly detection algorithm in complex electromagnetic environment

DH Cheng, SL Fang, MY Jiang… - … Conference on Image …, 2022 - spiedigitallibrary.org
Under the condition of modern information technology, the scale of battlefield
electromagnetic information increases exponentially, which makes the electromagnetic …

[PDF][PDF] EV-DO 前向链路时分导频的信道估计方法

王强, 王大鸣, 张欣然, 王超 - 电信科学, 2010 - infocomm-journal.com
EV1DO 系统前向链路物理层信道构成如图1 所示. 前向链路信道主要由导频(Pilot) 信道,
媒体接入控制(MAC) 信道, 业务(Traffic) 信道和控制(Control) 信道组成. 其中MAC …

[PDF][PDF] 基于heavy hitter 流提取的网络异常检测优化研究

张玉, 戴磊 - 电信科学, 2010 - infocomm-journal.com
由于网络吞吐量的快速增长, 高速网络下的测量与监控在计算和存储性能方面正面临巨大的挑战
, 因此长流提取, 高速流识别等按需监控技术逐渐受到研究者们的关注, 成为网络测量与监控领域 …

[PDF][PDF] ENHANCING COMPUTER NETWORK SECURITY THROUGH IMPROVED OUTLIER DETECTION FOR DATA STREAMS

M HEIGL - core.ac.uk
The omnipresent internetworking of embedded devices in all areas of life is driven by
various trends such as the Internet of Things or Autonomous Vehicles and the emergence of …

Variable-size vector entropy coding of speech and audio

Y Shoham - 2001 IEEE International Conference on Acoustics …, 2001 - ieeexplore.ieee.org
Many modern analog media coders employ some form of entropy coding (EC). Usually, a
simple per-letter EC is used to keep the coder's complexity and price low. In some coders …

Two‐stage selective sampling for anomaly detection: analysis and evaluation

G Androulidakis, S Papavassiliou - Security and …, 2011 - Wiley Online Library
Sampling has become an essential component of scalable Internet traffic monitoring and
anomaly detection. This paper emphasizes on the analysis and evaluation of the impact of …

A probabilistic flow sampling method for traffic anomaly detection

S DONG, B ZHANG - 电子与信息学报, 2019 - jeit.ac.cn
For problems of not meeting the demand of sampling both large flows and small flows at the
same time, and not distinguishing flash crowd from traffic attacks in building network traffic …

[PDF][PDF] Hardware-Accelerated Anomaly Detection in High-Speed Networks

V Krmıcek - 2013 - is.muni.cz
Growing speeds of computer networks and rising number of Internet users increase
requirements for effective network monitoring and surveillance and a lot of past methods are …