2Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. In: Proc. of the 2004 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2004. 219-230. http://portal.acm.org/citation.cfm?id=1015492.
3Krishnamurthy B, Sen S, Zhang Y, Chcn Y. Sketch-Based change detection: Methods, evaluation, and applications. In: Proc. of the ACM SIGCOMM Internet Measurement Conf. New York: ACM Press, 2003. 234-247. http://portal.acm.org/citation.cfm?id= 948236.
4Schweller R, Li ZC, Chen Y, Gao Y, Gupta A. Reverse hashing for high-speed network monitoring: Algorithms, evaluation, and applications. In: Proc. of the 25th IEEE Int'l Conf. on Computer Communications. New York: IEEE, 2006. 1397-1408.
5Dewaele G, Fukuda K, Borgnat P. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Proc. of the Int'l Multimedia Conf. of the 2007 Workshop: Large Scale Attack Defense. New York: ACM Press, 2007. 145-152. http://portal.acm.org/citation.cfm?id=1352664.1352675.
6Muthukrishnan S. Data streams: Algorithms and applications. 2007. http://www.cs.rutgers.vdu/-muthu/stream-1-1.ps.
7Lawrence C J, Wegman MN. Universal classes of hash functions. Journal of Computer and System Sciences, 1979,18(2): 143-154.
8Wegman M, Carter J. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 1981,22(3):265-279.
9NLANR. Retrieved May 10, 2008. ftp://pma.nlanr.net/traces/long/ipls/5/.