2018
DOI: 10.1109/tnet.2018.2819504
|View full text |Cite
|
Sign up to set email alerts
|

Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(7 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…Let S be denoted as S = {S t } T t=1 , where S t is shown in Eq. (11). The steps of the pruning strategy are as follows:…”
Section: Pseudo-anomaly Pruning Strategymentioning
confidence: 99%
See 1 more Smart Citation
“…Let S be denoted as S = {S t } T t=1 , where S t is shown in Eq. (11). The steps of the pruning strategy are as follows:…”
Section: Pseudo-anomaly Pruning Strategymentioning
confidence: 99%
“…Anomaly detection involves finding values that are inconsistent with most of the values in a dataset, and it has many important applications, such as fraud detection for mobile devices or credit cards [1], intrusion detection for network services [2]- [4], and fraud detection in online social media and wireless sensor networks [5]- [11]. Although anomalous behaviors in these cases are rare, they can provide more important information than other behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…Note that traffic matrix interpolation is a related, but different problem, with different properties. Xie et al [52], [51], [50] exploit hidden spatial and temporal structures with three-dimensional low-rank tensors, which effectively reduces the estimation error. Zhang et al [56] interpolate incomplete traffic matrices with structure regularized low-rank matrix factorization and local interpolation procedures.…”
Section: Related Workmentioning
confidence: 99%
“…There are multiple destinations for multicast. It has an extensive and applicable future, and plays an important role in software updates and data monitoring [23][24][25]. The bandwidth consumption of the backbone network is reduced by more than 50% with multicast [26].…”
Section: Introductionmentioning
confidence: 99%