共 10 条
- [1] Ali SHA, 2016, IEEE IJCNN, P2979, DOI 10.1109/IJCNN.2016.7727577
- [2] Balkanli E, 2015, 2015 IEEE 40TH LOCAL COMPUTER NETWORKS CONFERENCE WORKSHOPS (LCN WORKSHOPS), P611, DOI 10.1109/LCNW.2015.7365905
- [4] Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
- [5] Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 39 - 43
- [6] Kumar S., 2018, COMPUTATIONAL DATA S, DOI [10.1007/978-3-030-04648- 4_43, DOI 10.1007/978-3-030-04648-4_43]
- [7] A network-based framework for mobile threat detection [J]. 2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 227 - 233
- [8] Lashkari A. H., 2017, CHARACTERIZATION TOR
- [9] Skrjanc I., 2017, P IEEE S SERIES COMP, P1
- [10] Zhang R., 2017, Applications and Techniques in Information Security, P157