共 10 条
[1]
[Anonymous], P PASS ACT MEAS WORK
[2]
Cao K, 2018, J INF PROCESS SYST, V14, P1508
[3]
Cui WD, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P199
[4]
Cui WD, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P391
[5]
He K, 2015, INT CONF WIRE COMMUN
[6]
Lee G. I., 2019, THESIS
[7]
Lin RQ, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), P300, DOI 10.1109/CompComm.2015.7387586
[8]
Wondracek G., 2008, P NETWORK DISTRIBUTE, P1
[9]
POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1532-1534
[10]
Robust Network Traffic Classification
[J].
IEEE-ACM TRANSACTIONS ON NETWORKING,
2015, 23 (04)
:1257-1270