共 17 条
[1]
Manyika J., Chui M., Brown B., Bughin J., Dobbs R., Roxburgh C., Byers A.H., Big data: The next frontier for innovation, Competition, and Productivity, (2011)
[2]
Meeker M., Wu L., Mary Meeker's 2013 Internet Trends Report, (2013)
[3]
Visual Networking Index: Forecast and Methodology, 2010-2015, (2011)
[4]
Li T., Han F.Y., Ding S., Chen Z., LARX: Largescale anti-phishing by retrospective data-exploring based on a cloud computing platform, Proc. 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1-5, (2011)
[5]
Chen Z., Han F.Y., Cao J.W., Jiang X., Chen S., Cloud computing-based forensic analysis for collaborative network security management system, Tsinghua Science and Technology, 18, 1, pp. 40-50, (2013)
[6]
Chen Z., Ruan L.Y., Cao J.W., Yu Y., Jiang X., TIFAflow: Enhancing traffic archiving system with flow granularity for forensic analysis in network security, Tsinghua Science and Technology, 18, 4, pp. 406-417, (2013)
[7]
Kornexl S., Paxson V., Dreger H., Feldmann A., Sommer R., Building a time machine for efficient recording and retrieval of high-volume network traffic, Proc. 5th ACM SIGCOMM Conference on Internet Measurement, (2005)
[8]
Maier G., Sommer R., Dreger H., Feldmann A., Paxson V., Schneider F., Enriching network security analysis with time travel, Proc. ACM SIGCOMM 2008 Conference on Data Communication, pp. 183-194, (2008)
[9]
Li J., Ding S., Xu M., Han F.Y., Guan X., Chen Z., TIFA: Enabling real-time querying and storage of massive stream data, Proc. International Conference on Networking and Distributed Computing (ICNDC), pp. 61-64, (2011)
[10]
Wu K., Ahern S., Bethel E.W., Chen J., Childs H., Cormier-Michel E., Geddes C., Gu J., Hagen H., Hamann B., Koegler W., Lauret J., Meredith J., Messmer P., Otoo E., Perevoztchikov V., Poskanzer P.A., Rbel O., Shoshani A., Sim A., Stockinger K., Weber G., Zhang W.M., FastBit: Interactively searching massive data, Journal of Physics: Conference Series, 180, 1, (2009)