共 29 条
[1]
Al-Duwairi Basheer, 2010, Proceedings of the Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), P16, DOI 10.1109/ICIMP.2010.11
[2]
[Anonymous], 2008, UTDCS0508
[3]
[Anonymous], P 1 USENIX WORKSH LA
[4]
[Anonymous], 2010, J NETW
[5]
[Anonymous], 2006, P 6 ACM SIGCOMM C IN
[6]
A Survey of Botnet and Botnet Detection
[J].
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES,
2009,
:268-+
[7]
A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network
[J].
WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS,
2009,
:909-+
[8]
Giroire F, 2009, LECT NOTES COMPUT SC, V5758, P326, DOI 10.1007/978-3-642-04342-0_17
[9]
GRIZZARD JB, 2007, P 1 WORKSH HOT TOP U
[10]
Gu G, 2008, P 17 USENIX SEC S SA