Load characterization, overload prediction, and load anomaly detection for voice over IP traffic. Mandjes, M.R.H.; Saniee, I.; Stolyar, A.L. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please A...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Voice is expected to be an emerging and cost effective service in present IP networks. However, the ...
Detecting anomalous traffic (and above all new ad-hoc attacks) with low false alarm rates is of prim...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
The control of communication networks critically relies on procedures capable of detecting unanticip...
Abstract—We study the parameters (knobs) of distribution-based anomaly detection methods, and how th...
Optimal detection of unusual and significant changes in network Origin-Destination (OD) traffic volu...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
International audienceOptimal detection of unusual and significant changes in network Origin-Destina...
International audienceThe crucial future role of Internet in society makes of network monitoring a c...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Voice is expected to be an emerging and cost effective service in present IP networks. However, the ...
Detecting anomalous traffic (and above all new ad-hoc attacks) with low false alarm rates is of prim...
We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically ari...
Abstract—We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typi...
The control of communication networks critically relies on procedures capable of detecting unanticip...
Abstract—We study the parameters (knobs) of distribution-based anomaly detection methods, and how th...
Optimal detection of unusual and significant changes in network Origin-Destination (OD) traffic volu...
Computer networks are becoming increasingly important in supporting business and everyday activities...
Computer networks are becoming increasingly important in supporting business and everyday activities...
International audienceOptimal detection of unusual and significant changes in network Origin-Destina...
International audienceThe crucial future role of Internet in society makes of network monitoring a c...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
In this paper we present methodological advances in anomaly detection, which, among other purposes, ...
Anomaly detection in computer networks yields valuable information on events relating to the compone...
Voice is expected to be an emerging and cost effective service in present IP networks. However, the ...
Detecting anomalous traffic (and above all new ad-hoc attacks) with low false alarm rates is of prim...