共 44 条
[1]
Agarwal P., 2014, INT J INNOV ADV COMP, V3
[2]
Anagnostakis K. G., 2005, USENIX SECUR
[3]
[Anonymous], BRO NETW SEC MON
[4]
Arshad S., 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE 2011), P564, DOI 10.1109/ICCAIE.2011.6162198
[5]
Detecting Botnets using Command and Control Traffic
[J].
2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS,
2009,
:156-+
[6]
Bacher P., 2005, TECH REP
[7]
Balram Soniya, 2014, International Journal of Network Security, V16, P46
[8]
Behal S., 2010, SIGNATURE BASED BOT
[10]
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds
[J].
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4,
2016,
:133-146