共 90 条
[1]
[Anonymous], 2006, SIGCOMM Workshop on Mining Network Data, page, DOI DOI 10.1145/1162678.1162679
[2]
[Anonymous], SMART TRANSMISSION G
[3]
[Anonymous], IN DEPTH ANAL ABUSE
[4]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[5]
Bayesian neural networks for Internet traffic classification
[J].
IEEE TRANSACTIONS ON NEURAL NETWORKS,
2007, 18 (01)
:223-239
[6]
Benevenuto F., 2010, COLL EL MESS ANT SPA, V6, P1
[9]
Bishop CM., 2006, Springer Google Schola, V2, P1122, DOI [10.5555/1162264, DOI 10.18637/JSS.V017.B05]
[10]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792