共 21 条
[1]
Aceto G., 2010, Proceedings of INFOCOM IEEE Conference on Computer Communications Workshops, P1
[2]
A Proxy Identifier based on Patterns in Traffic Flows
[J].
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE),
2015,
:118-125
[3]
Arndt D.., 2011, NETMATE FLOWCALC D A
[4]
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[5]
Geetha S.., 2016, COMBATING SECURITY B
[6]
Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification
[J].
IEEE SYSTEMS JOURNAL,
2016, 10 (04)
:1390-1401
[7]
Handelman S, 1999, 2724 INT ENG TASK FO
[8]
Harmening J.T., 2017, Computer and Information Security Handbook, P843
[9]
Hunt T., 2016, OBSERVATIONS THOUGHT