共 24 条
[1]
[Anonymous], LIBPC FIL FORM
[2]
[Anonymous], SEC TECHN ICCST 2014
[3]
Detection of Application Layer DDoS Attacks with Clustering and Bayes Factors
[J].
2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013),
2013,
:156-161
[4]
Corona I, 2010, JMLR WORKSH CONF PRO, V11, P160
[5]
Dierks T., 2006, 4346 IETF RFC
[6]
Durcekova V., 2012, 2012 Proceedings of the 9th Conference of ELEKTRO (ELEKTRO 2012), P55, DOI 10.1109/ELEKTRO.2012.6225571
[7]
Ester M., 1996, DENSITY BASED ALGORI, DOI DOI 10.5555/3001460.3001507
[8]
Gu Q., 2008, HDB COMPUTER NETWORK, V3
[9]
Jie Zhang, 2010, 2010 International Conference on Information, Networking and Automation (ICINA 2010), P67, DOI 10.1109/ICINA.2010.5636786
[10]
Johnson A.R., 1998, Applied multivariate statistical analysis