共 30 条
[2]
[Anonymous], 2014, ARXIV14020856
[3]
[Anonymous], 2012, Em: Journal of Information Security
[4]
Bansal R, 2016, 2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), P373, DOI 10.1109/CONFLUENCE.2016.7508146
[5]
Detecting an Anomalous Traffic Attack Area based on Entropy Distribution and Mahalanobis Distance
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2014, 8 (02)
:87-94
[7]
Network Anomaly Detection: Methods, Systems and Tools
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2014, 16 (01)
:303-336
[8]
Brauckhoff D., INFOCOM 09, P2866
[9]
Callegari C., 2011, Communications (ICC), 2011 IEEE International Conference on, IEEE, P1, DOI DOI 10.1109/ICC.2011.5962595