共 29 条
[1]
[Anonymous], 2012, ROUGH SETS SELECTED
[3]
Bernaille L, 2007, LECT NOTES COMPUT SC, V4427, P165
[5]
Inference and Analysis of Formal Models of Botnet Command and Control Protocols
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:426-439
[6]
Cui W, 2007, P 16 USENIX SEC S US, P1
[7]
Erman J., 2006, P 49 IEEE GLOB TEL C, P1, DOI DOI 10.1109/GLOCOM.2006.443
[8]
Erman J, 2007, PERF E R SI, V35, P369
[9]
Erman Jeffrey., 2006, Proceedings of the 2006 SIGCOMM workshop on Mining Network Data, P281
[10]
Georgieva O, 2011, LECT NOTES COMPUT SC, V6881, P82, DOI 10.1007/978-3-642-23851-2_9