[1] |
JIA Yan, HAN Weihong, WANG Wei.Research and Implementation Security Situation Analysis and Prediction System for Large-scale Network[J]. Information Technology and Network Security, 2018, 37(2): 17-22.
|
|
贾焰,韩伟红,王伟.大规模网络安全态势分析系统YHSAS设计与实现[J]. 信息技术与网络安全,2018,37(2):17-22.
|
[2] |
SONG Jiaming.Analysis of Network Abnormal Behavior Based Artifical Intelligence[D]. Beijing: Beijing University of Posts and Telecommunications, 2019.
|
|
宋佳明. 基于人工智能的网络异常行为分析[D].北京:北京邮电大学,2019.
|
[3] |
ZHANG Yanhua, ZHANG Yangsen, MA Hongxia.Method for Mining and Analyzing Network Log Attribute[J]. Application Research of Computers, 2017, 34(5): 1410-1414.
|
|
张艳华,张仰森,马红霞.一种网络日志属性挖掘与分析方法[J].计算机应用研究,2017,34(5):1410-1414.
|
[4] |
YANG Min, ZHANG Shibin, ZHANG Hang, et al.A New User Behavior Evaluation Method in Online Social Network[J]. Journal of Information Security and Applications, 2019, 47(1): 217-222.
|
[5] |
LU Jiazhong.APT Attack Modeling and Detection Technology Based on Depth Analysis of Whole Network Trafficand Logs[D]. Chengdu: University of Electronic Science and Technology of China, 2019.
|
|
卢嘉中. 基于全网流量与日志深度分析的APT攻击建模与检测技术[D].成都:电子科技大学,2019.
|
[6] |
LIU Zhen, WANG Ruoyu, CAI Xianfa, et al.Survey on Trafficfeaturesin Internet Traffic Classification[J]. Application Research of Computers, 2017, 34(1): 8-14, 41.
|
|
刘珍,王若愚,蔡先发,等.互联网流量分类中流量特征研究[J].计算机应用研究,2017,34(1):8-14,41.
|
[7] |
LI Mingyue, LUO Xiangyang, CHAI Lixiang, et al.City-Level IP Geolocation Method Based on Network Node Clustering[J]. Journal of Computer Research and Development, 2019, 56(3): 467-479.
|
|
李明月,罗向阳,柴理想,等.基于网络节点聚类的目标IP城市级定位方法[J].计算机研究与发展,2019,56(3):467-479.
|
[8] |
DU Xiaofeng, CHEN Shiping.A Hybrid P2P Overlay for Multi-attribute Queries in Cloud Computing[J]. Electronic Science and Technology, 2016, 29(7): 47-50.
|
|
杜晓锋,陈世平.云计算环境下支持多属性查找的混合对等网络[J].电子科技,2016,29(7):47-50.
|
[9] |
TAN Xincheng, XIE Yi, MA Haishou, et al.Recognizing the Content Types of Network Traffic Based on A Hybrid DNN-HMM Model[J]. Journal of Network and Computer Applications, 2019, 142(3): 51-62.
|
[10] |
CAO Zhekang.Research and Applicationof Key Technologies for Regional Load Balancing Based on Open WRT System[D]. Zhengzhou: Zhengzhou University, 2018.
|
|
曹哲康. 基于OpenWRT系统的区域负载均衡关键技术研究与应用[D].郑州:郑州大学,2018.
|
[11] |
FRIEDRICH C, MORITZ H, MARCUS C, et al.Peer-to-Peer Sharing and Collaborative Consumption Platforms: A Taxonomy and A Reproducible Analysis[J]. Information Systems and e-Business Management, 2018, 16(2): 293-325.
|
[12] |
HAN Qiyi.Research on The Security Mechanism of P2P Networking Monitoring and Trust Model[D]. Chengdu: University of Electronic Science and Technology of China, 2016.
|
|
韩祺祎. P2P网络监控与信任安全机制研究[D].成都:电子科技大学,2016.
|
[13] |
WANG Pengfei.Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis[D]. Jinan: Shandong University, 2018.
|
|
王鹏飞. 基于周期性通讯行为的P2P僵尸网络检测[D].济南:山东大学,2018.
|
[14] |
WANG Jiao.The Study of P2P and Anomaly Traffic Identification Technology Based on Behavior Analysis[D]. Beijing: Beijing University of Posts and Telecommunications, 2008.
|
|
王蛟. 基于行为的P2P流量及异常流量检测技术研究[D].北京:北京邮电大学,2008.
|
[15] |
YUAN Huabing.Study on P2P Network Flow Recognition Algorithm Based on Machine Learning[J]. Computer & Digital Engineering, 2019, 47(10): 2387-2391.
|
|
袁华兵. 一种基于机器学习的P2P网络流量识别算法研究[J].计算机与数字工程,2019,47(10):2387-2391.
|