共 39 条
[1]
Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/infocom41043.2020.9155465, 10.1109/INFOCOM41043.2020.9155465]
[2]
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
[J].
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2020,
:888-898
[3]
[Anonymous], The caida ucsd anonymized internet traces 2015
[4]
Braverman V., 2018, LIPIcs, P1
[7]
Dimitropoulos X, 2008, ACM SIGCOMM COMP COM, V38, P7, DOI 10.1145/1341431.1341433
[9]
Duffield N., 2004, Performance Evaluation Review, V32, P85, DOI 10.1145/1012888.1005699
[10]
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2003, 21 (03)
:270-313