共 13 条
- [1] [Anonymous], 2014, INT C SEC COMP NETW
- [2] Chanda K, 2014, INT J COMPUTER APPL, V91, P12
- [3] On the Effectiveness of Different Botnet Detection Approaches [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 121 - 135
- [4] Ji Y., 2014, INT C INFORM SECURIT, P75, DOI DOI 10.1007/978-3-319-06320-1_7
- [5] Botnet detection techniques: review, future trends, and issues [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2014, 15 (11): : 943 - 983
- [6] Nagaraja S, 2014, LECT NOTES COMPUT SC, V8713, P439, DOI 10.1007/978-3-319-11212-1_25
- [7] PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2014, (01): : 1 - 12
- [8] Pomorova O, 2014, COMM COM INF SC, V431, P265
- [9] Schiavoni S, 2014, LECT NOTES COMPUT SC, V8550, P192
- [10] Tyagi Amit Kumar, 2012, INT J APPL INFORM SY, V2, P34