共 19 条
[1]
Amoli Payam Vahdani, 2013, 2013 IEEE International Workshop on Measurements & Networking (M&N), P149, DOI 10.1109/IWMN.2013.6663794
[2]
Network intrusion detection systems in high-speed traffic in computer networks
[J].
2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE),
2013,
:168-175
[3]
Catania Carlos, 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), P655, DOI 10.1109/IDAACS.2013.6663006
[4]
Chen QW, 2013, ICCAD-IEEE ACM INT, P202, DOI 10.1109/ICCAD.2013.6691119
[5]
Chih-Hung Lin, 2012, 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). Proceedings, P249, DOI 10.1109/CloudCom.2012.6427583
[7]
Hasan R, 2013, 2013 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL ENGINEERING (ICAEE 2013), P329, DOI 10.1109/ICAEE.2013.6750358
[8]
HIEU TT, 2013, UB FUT NETW ICUFN 20, P252
[9]
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
[J].
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS),
2014,
:4895-4904
[10]
Huan-ming Wen, 2011, 2011 International Conference on Multimedia Technology, P757