共 47 条
[1]
Aggarwal CC, 2004, LECT NOTES COMPUT SC, V2992, P183
[2]
ALEROUD A, 2016, P INT S SEC VIRT INF, V33, P934, DOI DOI 10.1007/978-3-319-48472-3_59
[3]
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2018, 48 (02)
:207-223
[4]
[Anonymous], 2000, P ACM SIGMOD INT C M
[5]
[Anonymous], 2007, NDSS
[6]
Brekne T., 2005, Privacy Enhancing Technologies. 5th International Workshop, PET 2005. Revised Selected Papers (Lecture Notes in Computer Science Vol. 3856), P179
[7]
Brekne T, 2005, Proceedings of the Third IASTED International Conference on Communications and Computer Networks, P43
[8]
Brekne T, 2006, LECT NOTES COMPUT SC, V3856, P179
[9]
Burkhart M, 2010, ACM SIGCOMM COMP COM, V40, P6, DOI 10.1145/1672308.1672310
[10]
Center for Applied Internet Data Analysis (CAIDA), 2015, US