共 20 条
- [1] A Survey of Botnet Technology and Defenses [J]. CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 299 - +
- [2] Bilge L., 2012, P 28 ANN COMP SEC AP, DOI 10.1145/2420950.2420969
- [3] Brownlee N., 1999, RFC2722: Traffic Flow Measurement: Architecture USA: RFC
- [4] Choi H., 2011, J COMPUTER NETWORKS, V56, P2033
- [5] Dayan P, 1999, UNSUPERVISED LEARNIN
- [6] A Survey of Botnet and Botnet Detection [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 268 - +
- [7] Hyslip Thomas S., 2015, SURVEY BOTNET DETECT
- [8] A Framework for Understanding Botnets [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 917 - 922
- [9] Livadas C, 2006, CONF LOCAL COMPUT NE, P967
- [10] Lu W., 2011, COMPUT COMMUN, V34