共 27 条
[1]
[Anonymous], 2011, WORKSHOP BUILDING AN, DOI DOI 10.1145/1978672.1978676
[2]
[Anonymous], 2016, P 2016 INT C INF SCI
[3]
[Anonymous], 2018, Softw. Netw., DOI DOI 10.13052/JSN2445-9739.2017.009
[4]
Brown C., 2009, Planning for disaster debris management, P1
[5]
Chitrakar R, 2012, INT C WIREL COMM NET
[6]
Creech G, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P4487
[7]
Ghorbani Ali L. W., 2010, NETWORK INTRUSION DE
[8]
Uses and Challenges for Network Datasets
[J].
CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS,
2009,
:73-82
[9]
Koch R., 2017, P TERENA NETW C, P7
[10]
Characterization of Tor Traffic using Time based Features
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:253-262