共 8 条
[1]
[Anonymous], 2015, BLACKHAT US
[2]
Cotton M, 2011, AM J TROP MED HYG, V85, P957
[3]
Moore A. W., 2005, Performance Evaluation Review, V33, P50, DOI 10.1145/1071690.1064220
[4]
Toward the accurate identification of network applications
[J].
PASSIVE AND ACTIVE NETWORK MEASUREMENT, PROCEEDINGS,
2005, 3431
:41-54
[5]
Nguyen T. T. T., IEEE Communications Surveys Tutorials, V10, P56
[6]
Sen Subhabrata., 2004, WWW
[7]
Vincent P, 2010, J MACH LEARN RES, V11, P3371
[8]
Yang SQ, 2016, UNKNOWN PROTOCOL AWA