<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/tag/monitoring</id>
  <updated>2017-10-03T09:14:21-04:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>US Telco Fined $3 Million in Domain Renewal Blunder</title>
    <link rel="alternate" href="https://www.bleepingcomputer.com/news/technology/us-telco-fined-3-million-in-domain-renewal-blunder/"/>
    <id>b049bf4f02c043e86e75dc81346c4a6f</id>
    <published>2017-10-03T09:14:21-04:00</published>
    <updated>2017-10-03T09:14:21-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">US Telco Fined $3 Million in Domain Renewal Blunder</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>My Philosophy on Alerting - Google Docs</title>
    <link rel="alternate" href="https://docs.google.com/document/d/199PqyG3UsyXlwieHaqbGiWVa8eMWi8zzAn0YfcApr8Q/edit"/>
    <id>df733545112d8f167118172b8d50b214</id>
    <published>2017-02-28T11:04:23-05:00</published>
    <updated>2017-02-28T11:04:23-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">My Philosophy on Alerting - Google Docs</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Sketch based anomaly detection, identification and performance evaluation</title>
    <link rel="alternate" href="http://prunel.ccsd.cnrs.fr/docs/00/17/54/74/PDF/saint07_abry_SketchAnomalyDetect.pdf"/>
    <id>c60a9908614b44fe069068eb56246a4a</id>
    <published>2010-11-10T17:35:56-05:00</published>
    <updated>2010-11-10T17:35:56-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Sketch based anomaly detection, identification and performance evaluation</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedures</title>
    <link rel="alternate" href="http://www.iijlab.net/~kjc/papers/lextracting.pdf"/>
    <id>515c9dd541ade6d0fffa9c0334004e74</id>
    <published>2010-11-10T16:55:36-05:00</published>
    <updated>2010-11-10T16:55:36-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedures</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Use of Spectral Analysis in Defense Against DoS Attacks</title>
    <link rel="alternate" href="http://www.eecs.harvard.edu/~htk/publication/2002-globecom-cheng-kung-tan.pdf"/>
    <id>7150cc7a09dc2e85d2f0c0ad5211f451</id>
    <published>2010-11-10T16:04:14-05:00</published>
    <updated>2010-11-10T16:04:14-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Use of Spectral Analysis in Defense Against DoS Attacks</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Online Detection of Network Trafﬁc Anomalies Using Behavioral Distance</title>
    <link rel="alternate" href="http://cs.gmu.edu/~xwangc/Publications/IWQoS2009-NetAnomalyDetection.pdf"/>
    <id>3cc2261dc1440754189cda366b29e2d4</id>
    <published>2010-11-10T15:59:08-05:00</published>
    <updated>2010-11-10T15:59:08-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Online Detection of Network Trafﬁc Anomalies Using Behavioral Distance</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Real-Time Detection of Stealthy DDos Attacks Using Time-Series Decomposition</title>
    <link rel="alternate" href="http://nrl.eecs.wsu.edu/pubs/Liu2010.pdf"/>
    <id>b47016020d4f75851ca459362d21e00d</id>
    <published>2010-11-10T15:55:45-05:00</published>
    <updated>2010-11-10T15:55:45-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Real-Time Detection of Stealthy DDos Attacks Using Time-Series Decomposition</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>PagerDuty: Phone Calls and On-Call Scheduling for your Monitoring Tools</title>
    <link rel="alternate" href="http://www.pagerduty.com/"/>
    <id>3f8cd0d8ec3c35a4e62ed9efea06d553</id>
    <published>2010-04-10T18:09:45-04:00</published>
    <updated>2010-04-10T18:09:45-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">PagerDuty: Phone Calls and On-Call Scheduling for your Monitoring Tools</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Holt-Winters Forecasting Applied to Poisson Processes in Real-Time</title>
    <link rel="alternate" href="http://www.evanmiller.org/poisson.pdf"/>
    <id>d78308e57d7e77cb22fbcb0c765d52b6</id>
    <published>2009-02-13T10:15:48-05:00</published>
    <updated>2009-02-13T10:15:48-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Holt-Winters Forecasting Applied to Poisson Processes in Real-Time</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Aberrant Behavior Detection in Time Series for Network Service Monitoring</title>
    <link rel="alternate" href="http://www.usenix.org/events/lisa2000/full_papers/brutlag/brutlag_html/index.html"/>
    <id>36bce0900aa29d08e61194365f7fac75</id>
    <published>2007-03-09T21:51:54-05:00</published>
    <updated>2007-03-09T21:51:54-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Aberrant Behavior Detection in Time Series for Network Service Monitoring</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>7 free tools for managing your network - Network World</title>
    <link rel="alternate" href="http://www.networkworld.com/news/2007/030707-network-pros-favorite-freeware.html?page=2"/>
    <id>b253495e09aea9f3f52b2f4800c65779</id>
    <published>2007-03-08T11:41:30-05:00</published>
    <updated>2007-03-08T11:41:30-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">7 free tools for managing your network - Network World</summary>
    <content type="html">Network World reviews argus. I was wondering my my web server was so busy.</content>
  </entry>
  <entry>
    <title>Argus - System and Network Monitoring Software</title>
    <link rel="alternate" href="http://argus.tcp4me.com/"/>
    <id>ffb45433a3e9cf3b3c89330c87222b79</id>
    <published>2005-01-14T12:59:50-05:00</published>
    <updated>2005-01-14T12:59:50-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Argus - System and Network Monitoring Software</summary>
    <content type="html">In God we trust, everything else we monitor.</content>
  </entry>
</feed>
