Anomaly detection based on feature extraction of unknown protocol payload format
暂无分享,去创建一个
Bin Wu | Zefan Song | Bin Wu | Zefan Song
[1] Yoshio Tateno,et al. Accuracy of estimated phylogenetic trees from molecular data , 1983, Journal of Molecular Evolution.
[2] Li Guo,et al. A semantics aware approach to automated reverse engineering unknown protocols , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[3] Robert E. Schapire,et al. The Boosting Approach to Machine Learning An Overview , 2003 .
[4] Christus,et al. A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .
[5] M. O. Dayhoff,et al. 22 A Model of Evolutionary Change in Proteins , 1978 .
[6] I. Bichindaritz,et al. Knowledge Based Phylogenetic Classification Mining , 2004, ICDM.
[7] Udi Manber,et al. A FAST ALGORITHM FOR MULTI-PATTERN SEARCHING , 1999 .
[8] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[9] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[10] S. Henikoff,et al. Amino acid substitution matrices from protein blocks. , 1992, Proceedings of the National Academy of Sciences of the United States of America.
[11] James Theiler,et al. Algorithmic transformations in the implementation of K- means clustering on reconfigurable hardware , 2001, FPGA '01.
[12] Konstantina Papagiannaki,et al. Toward the Accurate Identification of Network Applications , 2005, PAM.
[13] M. O. Dayhoff. A model of evolutionary change in protein , 1978 .
[14] Yoshio Tateno,et al. Accuracy of estimated phylogenetic trees from molecular data , 2005, Journal of Molecular Evolution.
[15] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.