Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A statistical approach to predictive detection

Published: 01 January 2001 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2015)Node anomaly detection for homogeneous distributed environmentsExpert Systems with Applications: An International Journal10.1016/j.eswa.2015.04.03742:20(7012-7025)Online publication date: 15-Nov-2015
  • (2010)Towards characterizing cloud backend workloadsACM SIGMETRICS Performance Evaluation Review10.1145/1773394.177340037:4(34-41)Online publication date: 27-Mar-2010
  • (2009)Performance management via adaptive thresholds with separate control of false positive and false negative errorsProceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management10.5555/1688933.1688964(195-202)Online publication date: 1-Jun-2009
  • Show More Cited By

Index Terms

  1. A statistical approach to predictive detection

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Computer Networks: The International Journal of Computer and Telecommunications Networking
      Computer Networks: The International Journal of Computer and Telecommunications Networking  Volume 35, Issue 1
      Special issue on selected topics in network and systems management
      Jan. 2001
      91 pages
      ISSN:1389-1286
      Issue’s Table of Contents

      Publisher

      Elsevier North-Holland, Inc.

      United States

      Publication History

      Published: 01 January 2001

      Author Tags

      1. prediction
      2. proactive management
      3. time series model

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Node anomaly detection for homogeneous distributed environmentsExpert Systems with Applications: An International Journal10.1016/j.eswa.2015.04.03742:20(7012-7025)Online publication date: 15-Nov-2015
      • (2010)Towards characterizing cloud backend workloadsACM SIGMETRICS Performance Evaluation Review10.1145/1773394.177340037:4(34-41)Online publication date: 27-Mar-2010
      • (2009)Performance management via adaptive thresholds with separate control of false positive and false negative errorsProceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management10.5555/1688933.1688964(195-202)Online publication date: 1-Jun-2009
      • (2009)Statistical profiling-based techniques for effective power provisioning in data centersProceedings of the 4th ACM European conference on Computer systems10.1145/1519065.1519099(317-330)Online publication date: 1-Apr-2009
      • (2008)Adaptive quality of service management for enterprise servicesACM Transactions on the Web10.1145/1326561.13265692:1(1-46)Online publication date: 3-Mar-2008
      • (2007)An adaptive anomaly detector for worm detectionProceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques10.5555/1361442.1361445(1-6)Online publication date: 10-Apr-2007
      • (2007)Perwez Shahabuddin, 1962--2005ACM Transactions on Modeling and Computer Simulation10.1145/1225275.122527717:2(6-es)Online publication date: 1-Apr-2007
      • (2006)The role of agents in enterprise system managementProceedings of the fifth international joint conference on Autonomous agents and multiagent systems10.1145/1160633.1160929(1530-1533)Online publication date: 8-May-2006
      • (2006)Application of anomaly detection algorithms for detecting SYN flooding attacksComputer Communications10.1016/j.comcom.2005.09.00829:9(1433-1442)Online publication date: 1-May-2006
      • (2006)Routing information system and HOIDS for detection method of vicious attack in large networksProceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking10.1007/11942634_93(917-926)Online publication date: 4-Dec-2006
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media