A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002. ,
DOI : 10.1145/637201.637210
Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, issue.4, pp.349-369, 1989. ,
DOI : 10.1016/0165-1684(89)90079-0
URL : https://hal.archives-ouvertes.fr/inria-00075657
Détection d'attaques de déni de service par un modèle non gaussien multirésolution, 2006. ,
Sketchbased change detection: Methods, evaluation, and applications, ACM IMC, 2003. ,
Diagnosing networkwide traffic anomalies, SIGCOMM, 2004. ,
DOI : 10.1145/1015467.1015492
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1838
DDoS attack detection and wavelets, International Conference on computer communications and networks, 2003. ,
DOI : 10.1109/icccn.2003.1284203
Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177099
Polynomial hash functions are reliable, Proc. 19th ICALP, pp.235-246, 1992. ,
DOI : 10.1007/3-540-55719-9_77
Data Streams: Algorithms and Applications, Foundations and Trends?? in Theoretical Computer Science, vol.1, issue.2, 2003. ,
DOI : 10.1561/0400000002
URL : http://ce.sharif.edu/courses/90-91/1/ce797-1/resources/root/Data_Streams_-_Algorithms_and_Applications.pdf
Non gaussian and long memory statistical characterisations for internet traffic with anomalies, IEEE Trans. on Depend. and Secure Comp, 2006. ,
URL : https://hal.archives-ouvertes.fr/ensl-00175477
Tabulation based 4-universal hashing with applications to second moment estimation, Proc. ACM-SIAM SODA, 2004. ,