共 19 条
- [1] Andersen D.G., 2003, USITS'03: Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems, P3
- [2] [Anonymous], 2008, BOTMINER CLUSTERING
- [3] Badishi G, 2007, IEEE T DEPEND SECURE, V4, P191, DOI [10.1109/TDSC.2007.70209, 10.1109/TDSC.2007.70209.]
- [4] Broder Andrei, 2002, Internet mathematics, P636, DOI DOI 10.1080/15427951.2004.10129096
- [5] Dixon C., 2008, NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, P45
- [6] Faloutsos M, 1999, COMP COMM R, V29, P251, DOI 10.1145/316194.316229
- [7] Fu Z., 2011, 201120 CHALM U TECHN
- [8] Fu Z., 2008, SRDS 08
- [9] Hussain A, 2003, ACM SIGCOMM COMP COM, V33, P99
- [10] SOS: Secure Overlay Services [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (04) : 61 - 72