共 26 条
[1]
Jaal: Towards Network Intrusion Detection at ISP Scale
[J].
CONEXT'17: PROCEEDINGS OF THE 2017 THE 13TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES,
2017,
:134-146
[2]
Geneva: Evolving Censorship Evasion Strategies
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:2199-2214
[3]
Recursive Lattice Search: Hierarchical Heavy Hitters Revisited
[J].
PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17),
2017,
:283-289
[4]
Cho Kyunghyun, 2014, P 2014 C EMP METH NA, P1724
[6]
Handley M, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P115
[8]
lib.erate, (n) : A library for exposing (traffic-classification) rules and avoiding them efficiently
[J].
PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17),
2017,
:128-141
[9]
Li SS, 2020, Arxiv, DOI arXiv:2007.09763
[10]
Structure Inference Net: Object Detection Using Scene-Level Context and Instance-Level Relationships
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:6985-6994