共 8 条
[1]
Diagnosing Network-Wide Traffic Anomalies. Lakhina A,,Crovella M,Diot C. ACM SIGCOMM . 2004
[2]
Extracting hidden anom-alies using sketch and non gaussian multiresolution statistical detec-tion procedures. DEWAELE G,FUKUDA K,BORGNATP. Proc of ACM SIGCOMM IMC . 2007
[3]
Sketch-Based change detection:Methods,evaluation,and applications. Krishnamurthy B,Sen S,Zhang Y,Chen Y. Proc.of the ACM SIGCOMM Internet Measurement Conf . 2003
[4]
Reverse hashing for high-speed network monitoring:Algorithms,evaluation,and applications. Schweller R,Li ZC,Chen Y,Gao Y,Gupta A. Proc.of the25th IEEE Int’l Conf.on Computer Communications . 2006
[5]
Data streams:Algorithms and applications. Muthukrishnan S. http://www.cs.rutgers.edu/~muthu/stream-1-1.ps . 2007
[6]
NLANR. ftp://pma.nlanr.net/traces/long/ipls/5/ . 2008
[7]
Universal classes of hash functions. J L Carter,M N Wegman. Journal of Computer and System Sciences . 1979
[8]
New hash functions and their use in authentication and set equality. Wegman M N,Carter J Lawrence. Journal of Computer and System Sciences . 1981