暂无分享,去创建一个
Jun Zhang | Yu Wang | Yang Xiang | Lei Pan | Yuantian Miao | Zichan Ruan | Jun Zhang | Yang Xiang | Lei Pan | Zichan Ruan | Yuantian Miao | Yu Wang
[1] Jun Liu,et al. Analysis of malware application based on massive network traffic , 2016, China Communications.
[2] Stefan Savage,et al. Unexpected means of protocol inference , 2006, IMC '06.
[3] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[4] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[5] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[6] Jun Zhang,et al. Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.
[7] Jun Zhang,et al. Internet Traffic Classification Using Constrained Clustering , 2014, IEEE Transactions on Parallel and Distributed Systems.
[8] Jie Wu,et al. Robust Network Traffic Classification , 2015, IEEE/ACM Transactions on Networking.
[9] Shan Suthaharan,et al. Big data classification: problems and challenges in network intrusion prediction with machine learning , 2014, PERV.
[10] Hamza Dahmouni,et al. A markovian signature-based approach to IP traffic classification , 2007, MineNet '07.
[11] Antonio Pescapè,et al. Analysis of a "/0" stealth scan from a botnet , 2015, TNET.
[12] Zhen Ling,et al. TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor , 2015, IEEE Transactions on Information Forensics and Security.
[13] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.