共 37 条
[21]
McGrew D., 2016, ICNP WORKSH MACH LEA
[22]
Mockapetris P., 1987, RFC 1034, DOI DOI 10.17487/RFC1034
[23]
Towards Automatic and Lightweight Detection and Classification of Malicious Web Contents
[J].
2015 THIRD IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES (HOTWEB),
2015,
:67-72
[24]
Moore A. W., 2005, Performance Evaluation Review, V33, P50, DOI 10.1145/1071690.1064220
[25]
Nagaraja S, 2010, USENIX SEC S, V10, P95
[26]
Nielsen Henrik, 1999, RFC 2616, DOI DOI 10.17487/RFC2616
[27]
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[28]
Saint-Andre P., 2011, 6125 RFC
[29]
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:305-316
[30]
Strayer WT, 2006, C LOCAL COMPUT NETW, P195