<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/tag/aberrant-behavior</id>
  <updated>2010-11-10T17:35:56-05:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>Sketch based anomaly detection, identification and performance evaluation</title>
    <link rel="alternate" href="http://prunel.ccsd.cnrs.fr/docs/00/17/54/74/PDF/saint07_abry_SketchAnomalyDetect.pdf"/>
    <id>c60a9908614b44fe069068eb56246a4a</id>
    <published>2010-11-10T17:35:56-05:00</published>
    <updated>2010-11-10T17:35:56-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Sketch based anomaly detection, identification and performance evaluation</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedures</title>
    <link rel="alternate" href="http://www.iijlab.net/~kjc/papers/lextracting.pdf"/>
    <id>515c9dd541ade6d0fffa9c0334004e74</id>
    <published>2010-11-10T16:55:36-05:00</published>
    <updated>2010-11-10T16:55:36-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedures</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Use of Spectral Analysis in Defense Against DoS Attacks</title>
    <link rel="alternate" href="http://www.eecs.harvard.edu/~htk/publication/2002-globecom-cheng-kung-tan.pdf"/>
    <id>7150cc7a09dc2e85d2f0c0ad5211f451</id>
    <published>2010-11-10T16:04:14-05:00</published>
    <updated>2010-11-10T16:04:14-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Use of Spectral Analysis in Defense Against DoS Attacks</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Online Detection of Network Trafﬁc Anomalies Using Behavioral Distance</title>
    <link rel="alternate" href="http://cs.gmu.edu/~xwangc/Publications/IWQoS2009-NetAnomalyDetection.pdf"/>
    <id>3cc2261dc1440754189cda366b29e2d4</id>
    <published>2010-11-10T15:59:08-05:00</published>
    <updated>2010-11-10T15:59:08-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Online Detection of Network Trafﬁc Anomalies Using Behavioral Distance</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Real-Time Detection of Stealthy DDos Attacks Using Time-Series Decomposition</title>
    <link rel="alternate" href="http://nrl.eecs.wsu.edu/pubs/Liu2010.pdf"/>
    <id>b47016020d4f75851ca459362d21e00d</id>
    <published>2010-11-10T15:55:45-05:00</published>
    <updated>2010-11-10T15:55:45-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Real-Time Detection of Stealthy DDos Attacks Using Time-Series Decomposition</summary>
    <content type="html"/>
  </entry>
</feed>
