References

  • H. Bunke, M. Kraetzl, P. J. Shoubridge, and W. D. Wallis. Detection of abnormal change in time series of graphs. Journal of Interconnection Networks, 3(1\&2):85 -- 101, 2002.
  • CERT Coordination Centre. Denial of service attacks. June 2001. Available at http://www.cert.org/tech_tips/denial_of_service.html.
  • P. Dickinson. Graph Based Techniques for Measurement of Intranet Dynamics. PhD thesis, Institute for Telecommunications Research, University of South Australia, Adelaide, August 2005.
  • P. Dickinson and M. Kraetzl. Novel approaches in modelling dynamics of networked surveillance environment. In Proceedings of the Sixth International Conference of Information Fusion, volume 1, pages 302--309, 2003.
  • F. Feather and R. Maxion. Fault detection in an ethernet network using anomaly signature matching. In Proceedings ACM SIGCOMM, volume 23, pages 279--288, San Francisco, CA, September 1993.
  • G. N. Higginbottom. Performance Evaluation of Communication Networks. Artech House, Massachusetts, 1998.
  • G. Jakobson and M. D. Weissman. Alarm correlation. IEEE Network Journal, 7(6):52--59, 1993.
  • J. L. Jerkins and J. L. Wang. A close look at traffic measurements from packet networks. In Proceedings of the IEEE GLOBECOM, volume 4, pages 2405--2411, 1998.
  • I. Katzela and M. Schwartz. Schemes for fault identification in communication networks. IEEE/ACM Transactions on Networking, 3(6):753--764, 1995.
  • D. D. Parkes and W. D. Wallis. Graph Theory and the Study of Activity Structure. Timing Space and Spacing Time, vol. 2: Human Activity and Time Geography. Edward Arnold, London, 1978.
  • R. A. Becker, S. G. Eick, and A. R. Wilks. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics, 1(1):16--21, 1995.
  • A. Sanfeliu and K. S. Fu. A distance measure between attributed relational graphs for pattern recognition. IEEE Transactions on Systems, Man, and Cybernetics, 13(3):353--362, 1983.
  • P. Shoubridge, M. Kraetzl, and D. Ray. Detection of abnormal change in dynamic networks. In Proceedings of the International Conference on Information, Decision and Control, pages 557--562, Adelaide, 1999.
  • M. Thottan and C. Ji. Anomaly detection in {IP} networks. IEEE Transactions on Signal Processing, 51(8):2191--2204, August 2003.
  • S. Umeyama. An eigendecomposition approach to weighted graph matching problems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 10(5):695--703, 1988.
  • D. B. West. Introduction to Graph Theory. Prentice Hall, New Jersey, 1996.
  • C. C. White, E.A. Sykes, and J. A. Morrow. An analytical approach to the dynamic topology problem. Telecommunication Systems, 3:397--413, 1995.
  • H. Bunke. Error correcting graph matching: on the influence of the underlying cost function. IEEE Transactions on Pattern Analysis and Machine Intelligence, 21:917--922, 1999.
  • H. Bunke. Recent developments in graph matching. In Proceedings 15th International Conference on Pattern Recognition, volume 2, pages 117--124, 2000.
  • H. Bunke and G. Allermann. Inexact graph matching for structural pattern recognition. Pattern Recognition Letters, May 1983.




Remember, for most actions you have to record/upload into this online system
and then inform the editor/author via clicking on an email icon or Completion button.
ANZIAM Journal, ISSN 1446-8735, copyright Australian Mathematical Society.