Towards highly reliable enterprise network services via inference of multi-level dependencies, SIGCOMM, pp.13-24, 2007. ,
Flame: a flow-level anomaly modeling engine, Proceedings of the conference on Cyber security experimentation and test. USENIX Association, 2008. ,
A tutorial on support vector machines for pattern recognition, Data Mining and Knowledge Discovery, vol.2, issue.2, pp.121-167, 1998. ,
DOI : 10.1023/A:1009715923555
Convolution kernels for natural language, Advances in Neural Information Processing Systems 14, pp.625-632, 2001. ,
Building better netflow, Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, 2004. ,
Characteristics of Denial of Service Attacks on Internet Using AGURI, In: Information Networking Lecture Notes in Computer Science, vol.2662, pp.849-857, 2003. ,
DOI : 10.1007/978-3-540-45235-5_83
BLINC: multilevel traffic classification in the dark, ACM Conference on Applications, technologies, architectures , and protocols for computer communications (SIGCOMM), 2005. ,
Quantifying the Extent of IPv6 Deployment, In: Lecture Notes in Computer Science, vol.5448, 2009. ,
DOI : 10.1007/978-3-540-79232-1_3
A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB Journal, vol.1, issue.2, pp.507-521, 2007. ,
DOI : 10.1007/s00778-006-0002-5
Mining anomalies using traffic feature distributions, In: ACM SIGCOMM', p.5, 2005. ,
Mining in a data-flow environment, Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '99, 1999. ,
DOI : 10.1145/312129.312212
Optimizing Weighted Kernel Function for Support Vector Machine by Genetic Algorithm, MICAI 2006: Advances in Artificial Intelligence, pp.583-592, 2006. ,
DOI : 10.1007/11925231_55
Portscan Detection with Sampled NetFlow, In: Lecture Notes in Computer Science, vol.5537, 2009. ,
DOI : 10.1007/978-3-642-01645-5_4
Learning with Kernels: Support Vector Machines, Regularization , Optimization, and Beyond, 2001. ,
Estimating the Support of a High-Dimensional Distribution, Neural Computation, vol.6, issue.1, pp.1443-1471, 2001. ,
DOI : 10.1214/aos/1069362732
NetFlow, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002. ,
DOI : 10.1145/637201.637226
A Labeled Data Set for Flow-Based Intrusion Detection, 2009. ,
DOI : 10.1007/978-3-642-04968-2_4
In: Statistical Learning Theory, 1998. ,
A tree kernel to analyze phylogenetic profiles, 2002. ,
Game theory driven monitoring of spatial-aggregated IP-Flow records, 2010 International Conference on Network and Service Management, 2010. ,
DOI : 10.1109/CNSM.2010.5691265
PeekKernelFlows, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.52-57, 2010. ,
DOI : 10.1145/1850795.1850801
Support Vector Machines: Theory and Applications, Studies in Fuzziness and Soft Computing, 2005. ,
DOI : 10.1007/b95439
Anomaly intrusion detection using one class svm, Information Assurance Workshop Proceedings from the Fifth Annual IEEE SMC, pp.358-364, 2004. ,
An svm-based machine learning method for accurate internet traffic classification, Information Systems Frontiers, vol.12, pp.149-156, 2010. ,
Using Support Vector Machine to Detect Unknown Computer Viruses, International Journal of Computational Intelligence Research, vol.2, issue.1, 2006. ,
DOI : 10.5019/j.ijcir.2006.51