[图书][B] Statistical analysis of network data with R

ED Kolaczyk, G Csárdi - 2014 - Springer
Networks and network analysis are arguably one of the largest growth areas of the early
twenty-first century in the quantitative sciences. Despite roots in social network analysis …

[PDF][PDF] Combining filtering and statistical methods for anomaly detection

A Soule, K Salamatian, N Taft - Proceedings of the 5th ACM SIGCOMM …, 2005 - usenix.org
In this work we develop an approach for anomaly detection for large scale networks such as
that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that of a …

A transfer double deep Q network based DDoS detection method for internet of vehicles

Z Li, Y Kong, C Jiang - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks have become one of the main factors restricting
the development of internet of vehicles (IoV). Although some intelligent reinforcement …

Traffic matrices: balancing measurements, inference and modeling

A Soule, A Lakhina, N Taft, K Papagiannaki… - Proceedings of the …, 2005 - dl.acm.org
Traffic matrix estimation is well-studied, but in general has been treated simply as a
statistical inference problem. In practice, however, network operators seeking traffic matrix …

Interactive temporal recurrent convolution network for traffic prediction in data centers

X Cao, Y Zhong, Y Zhou, J Wang, C Zhu… - IEEE Access, 2017 - ieeexplore.ieee.org
Accurately predicting future service traffic would be of great help for load balancing and
resource allocation, which plays a key role in guaranteeing the quality of service (QoS) in …

Deep learning-based resource allocation for 5G broadband TV service

P Yu, F Zhou, X Zhang, X Qiu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The vision of next-generation TV is to support media services to achieve sharing of cross-
domain experience, and the eMBB scenario of the 5G network is one of its important driving …

Processing intrusion detection alert aggregates with time series modeling

J Viinikka, H Debar, L Mé, A Lehikoinen, M Tarvainen - Information Fusion, 2009 - Elsevier
The main use of intrusion detection systems (IDS) is to detect attacks against information
systems and networks. Normal use of the network and its functioning can also be monitored …

GSP-kalmannet: Tracking graph signals via neural-aided Kalman filtering

I Buchnik, G Sagi, N Leinwand, Y Loya… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Dynamic systems of graph signals are encountered in various applications, including social
networks, power grids, and transportation. While such systems can often be described as …

Extended Kalman filter for graph signals in nonlinear dynamic systems

G Sagi, N Shlezinger… - ICASSP 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
We consider the problem of recovering random, time-varying graph processes in a nonlinear
dynamic system. The Extended Kalman filter (EKF) is a suitable estimator for such dynamics …

Machine learning-based 5G RAN slicing for broadcasting services

J Mu, X Jing, Y Zhang, Y Gong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Along with the commercialization of evolved multimedia broadcast multicast services
(eMBMS), the number of mobile broadcasting users is growing notably. Previous works …