共 27 条
- [1] Aggarwal C. C., 2001, SIGMOD Record, V30, P37, DOI 10.1145/376284.375668
- [2] Almotairi S., 2009, 2009 Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009), P7, DOI 10.1109/ICIMP.2009.9
- [3] Characterization of Attackers' Activities in Honeypot Traffic Using Principal Component Analysis [J]. 2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 147 - 154
- [4] [Anonymous], 2018, SOFTWARE NETWORKING
- [5] [Anonymous], P 10 ACM S INF COMP
- [6] [Anonymous], 2004, P AUSCERT AS PAC INF
- [7] [Anonymous], 2014, ACM SIGKDD EXPLOR NE, DOI [DOI 10.1145/2594473.2594476, 10.1145/2594473.2594476]
- [9] Charu C., 2012, ACM SIGKDD EXPLORATI, V14, P49, DOI DOI 10.1145/2481244.2481252
- [10] Fan W., 2017, IEEE SYSTEMS J, P1