共 21 条
[1]
[Anonymous], 2006, Methodology, DOI [DOI 10.1027/1614-2241.2.2.57, 10.1027/1614-2241.2.2.57]
[2]
Auchard E., GERMAN INTERNET OUTA
[3]
Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter
[J].
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017),
2017,
[5]
A Survey on Big Data for Network Traffic Monitoring and Analysis
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2019, 16 (03)
:800-813
[6]
Machine Learning DDoS Detection for Consumer Internet of Things Devices
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:29-35
[7]
Harshman R.A., 1984, Research methods for multimode data analysis, P566
[8]
Network Volume Anomaly Detection and Identification in Large-Scale Networks Based on Online Time-Structured Traffic Tensor Tracking
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2016, 13 (03)
:636-650