共 69 条
[31]
A flow-based method for abnormal network traffic detection
[J].
NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES,
2004,
:599-612
[32]
Krishnan Prabhakar, 2019, Ubiquitous Communications and Network Computing. Second EAI International Conference. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 276), P151, DOI 10.1007/978-3-030-20615-4_12
[33]
Krishnan P., 2019, SSCC 2018 COMMUNICAT, DOI [10.1007/978-981-13-5826-5_7, DOI 10.1007/978-981-13-5826-5_7]
[36]
Software-Defined Network Security over OpenStack Clouds: A Systematic Analysis
[J].
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE (CLOSER),
2020,
:423-429
[37]
Li J, 2020, 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), P157, DOI [10.1109/ICEMME51517.2020.00038, 10.1109/BigDataSecurity-HPSC-IDS49724.2020.00037]
[38]
Liu G, 2016, P 17 INT MIDDLEWARE, P1, DOI [10.1145/2988336.2988344, DOI 10.1145/2988336.2988344]
[39]
Lu W., 2009, LECT NOTES COMPUT SC, DOI [10.1007/978-3-642-04843-2_32, DOI 10.1007/978-3-642-04843-2_32]
[40]
Luo Y, 2016, IEEE INT CONF CLOUD, P51, DOI [10.1109/CLOUD.2016.15, 10.1109/CLOUD.2016.0017]