Ανάλυση δεδομένων Δικτύου πραγματικού χρόνου

Βιβλιογραφία - αναφορές

  1. Α. Feldman, A.C. Gilbert, etc. “Dynamics of IP traffic: A study of the role of variability and the impact of control”. ACM SIGCOMM ’99
  2. Α. Feldman, A.C. Gilbert, etc. “Deriving Traffic Demands for Operational Ip Networks: Methodology and Experience”. ACM SIGCOMM ’00
  3. Charu Aggarwal, Data Streams: Models and Algorithms, Springer, 2007
  4. iPolicy Networks home page. http://www.ipolicynetworks.com.
  5. Augustin Soule,Thomson Fernando Silveira, Haakon Ringberg «Challenging the Supremacy of Traffic Matrices in Anomaly Detection»
  6. Brian Babcock Shivnath Babu Mayur Datar Rajeev Motwani JenniferWidom «Models and Issues in Data Stream Systems ACM PODS 2002 June 3-6, Madison, Wisconsin, USA
  7. Bradley, P.S., Mangasarian, O.L., Musicant D.R.   Optimization methods in massive data sets, Handbook of Massive Data Sets (2002), Kluwer, 439-471.
  8. Cahill, M.H., Lambert, D., Pinheiro, J.C., Sun, D.X.   Detecting fraud in the real world, Handbook of Massive Data Sets (2002), Kluwer, 911-929.
  9. P. Abry, R. Baraniuk, P. Flandrin, R. Riedi, and D. Veitch, "The multiscale nature of network traffic: Discovery, Analysis, and Modelling," IEEE Signal Processing Magazine, Special issue on "Analysis and Modeling of High-Speed Data Network Traffic", vol. 19, no. 3, pp. 28--46, May 2002
  10. Anders Gunnar, Mikael Johansson, Thomas Telkamp, “Traffic matrix estimation on a large IP backbone: a comparison on real data”,IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
  11. Medina, C. Fraleigh, N. Taft, S. Bhattacharyya, and C. Diot, "A Taxonomy of IP Traffic Matrices," in SPIE ITCOM: Scalability and Traffic Control in IP Networks II, Boston, Aug. 2002.
  12. S. Vaton and A. Gravey, "Network tomography: an iterative bayesian analysis," in Proc. ITC 18, Berlin, Germany, August 2003
  13. Antonio Nucci , Ashwin Sridharan , Nina Taft, The problem of synthetically generating IP traffic matrices: initial recommendations, ACM SIGCOMM Computer Communication Review, v.35 n.3, July 2005
  14. C. Cortes, K. Fisher, D. Pregibon, and A. Rogers. «Hancock: a language for extracting signatures from data streams». In Proc. of the 2000 ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, pages 9–17, Aug. 2000
  15. Karen Kafadar, Edward J.Wegman «Visualizing “typical” and “exotic” Internet traffic data», Computational Statistics & Data Analysis (2006) 3721 – 3743
  16. Cleveland,W.S., Sun, D.X., 2000. «Internet traffic data»J. Amer. Statist. Assoc. 95 (451), 979–985.
  17. Ihaka, R., Gentleman, R., 1996. R: a language for data analysis and graphics. J. Comput. Graphical Statist. 5 (3), 299–314.
  18. Wegman, E.J., Marchette, D.J., 2003. «On some techniques for streaming data: a case study of Internet packet headers» J. Comput. Graphical Statist. 12 (4), 893–914.
  19. Wegman, E.J., Marchette, D.J., 2004. «Statistical analysis of network data for cybersecurity». Chance, 9–19.
  20. Wegman, E.J., Solka, J.L., 2005. «Statistical data mining. Handbook of Statistics», vol. 24, pp. 1–46.