共 40 条
- [1] Aksoy A, 2019, IEEE ICC
- [2] Identifying Encrypted Malware Traffic with Contextual Flow Data [J]. AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, : 35 - 46
- [3] [Anonymous], 2018, ARXIV180602679
- [4] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
- [6] Bao JQ, 2020, INT WIREL COMMUN, P565, DOI 10.1109/IWCMC48107.2020.9148110
- [7] Bezawada B., 2018, ARXIV180403852
- [9] IoT or NoT: Identifying IoT Devices in a Short Time Scale [J]. NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
- [10] Measuring Skewness: A Forgotten Statistic? [J]. JOURNAL OF STATISTICS EDUCATION, 2011, 19 (02):