共 14 条
- [1] [Anonymous], 2010, P 10 ACM SIGCOMM C I
- [2] [Anonymous], 2005, KDD, DOI [10.1145/1081870.1081927, DOI 10.1145/1081870.1081927]
- [3] Network Anomaly Detection: Methods, Systems and Tools [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
- [4] Gerhards R., 2009, 5424 RFC IETF
- [6] Jie Chu, 2012, Research in Attacks, Intrusions, and Defenses. Proceedings of the 15th International Symposium, RAID 2012, P294, DOI 10.1007/978-3-642-33338-5_15
- [7] Makanju A, 2013, 2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), P962
- [8] Nasir MAU, 2015, PROC INT CONF DATA, P137, DOI 10.1109/ICDE.2015.7113279
- [10] Potharaju R., 2013, P INT MEAS C IMC, P9