共 9 条
[1]
[Anonymous], 2016, INT J COMPUT SCI INF
[2]
Beigi EB, 2014, IEEE CONF COMM NETW, P247, DOI 10.1109/CNS.2014.6997492
[3]
Bilge L, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P129
[4]
Identification and Selection of Flow Features for Accurate Traffic Classification in SDN
[J].
2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA),
2015,
:134-141
[5]
An empirical comparison of botnet detection methods
[J].
COMPUTERS & SECURITY,
2014, 45
:100-123
[6]
Haddadi F., 2015, P 8 INT S FDN PRACT, P212
[7]
Su S. C., 2017, SECURITY COMMUNICATI
[8]
Tariq F, 2017, INT J SECUR APPL, V11, P1, DOI 10.14257/ijsia.2017.11.11.01