[1] |
WANG Xiaoqun, DING Li, LI Jia, et al.Summary of China’s Internet Network Security Situation in 2017[J]. Confidential Science and Technology, 2018, 92(5): 6-13.
|
|
王小群,丁丽,李佳,等. 2017年我国互联网网络安全态势综述[J].保密科学技术,2018,92(5):6-13.
|
[2] |
WANG Xiaoqun, DING Li, et al.Summary of China’s Internet Network Security Situation in 2018[J]. Confidential Science and Technology, 2019, 93(5): 4-9.
|
|
王小群,丁丽,等. 2018年我国互联网网络安全态势综述[J].保密科学技术, 2019,93(5):4-9.
|
[3] |
YANG Xinyu, YANG Shusen, LI Juan.A Flood-Down DDoS Attack Detection Algorithm Based on Nonlinear Preconditioned Network Traffic Prediction Method[J]. Chinese Journal of Computers, 2011, 34(2): 395-405.
|
|
杨新宇,杨树森,李娟.基于非线性预处理网络流量预测方法的泛洪型DDoS攻击检测算法[J].计算机学报,2011,34(2):395-405.
|
[4] |
FEINSTEIN L, SCHNACKENBERG D, BALUPARI R, et al.Statistical Approaches to DDoS Attack Detection and Response[C]//IEEE. DARPA Information Survivability Conference and Exposition, April 22-24, 2003, Washington, DC, USA. NJ: IEEE, 2003: 303-314.
|
[5] |
VIJAYASARATHY R, RAGHAVAN SV, RAVINDRAN B.A System Approach to Network Modeling for DDoS Detectionutilizing a Naive Bayesian Classifier[C]//IEEE. 2011 Third International Conference on Communication Systems and Networks, January 4-8, 2011, Bangalore, India. NJ: IEEE, 2011: 1-10.
|
[6] |
CHEN R C, CHENG Kaifan, CHEN Yinghao, et al.Using Rough Set and Support Vector Machinefor Network Intrusion Detection System[C]//IEEE. 2009 First Asian Conference on Intelligent Information and Database Systems, April 1-3, 2009, Dong Hoi, Vietnam. NJ: IEEE, 2009: 1-13.
|
[7] |
FARID D M, HARBI N, BAHRI E, et al. AttacksClassification in Adaptive Intrusion Detection UtilizingDecision Tree Global Journal of Electrical[EB/OL]. .
|
[8] |
LIU Peng,CHEN Houwu,FANG Xiao, et al.Research on Monitoring Mechanism and Model of Network Security Situation[J]. Netinfo Security, 2015, 15(9): 66-69.
|
|
刘鹏,陈厚武,房潇,等.网络安全态势监控机制与模型研究[J]. 信息网络安全,2015,15(9):66-69.
|
[9] |
SHARAFALDIN I, LASHKARI A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization[EB/OL]. .2019-6-30.
|
[10] |
WANG Yi, TANG Yong, LU Zexin, et al.Research on Features Selection in Malware Clustering[J]. Netinfo Security, 2016, 16(9): 64-68.
|
|
王毅,唐勇,卢泽新,等.恶意代码聚类中的特征选取研究[J].信息网络安全,2016,16(9):64-68.
|
[11] |
GIL G D, LASHKARI A H, et al. Characterization of Encrypted and VPN Traffic Using Time-Related Features[EB/OL]. ,2019-6-30.
|
[12] |
WANG Wei, SHEN Xudong.Research on Transfer Time Series Anomaly Detection Algorithm Based on Instance[J]. Netinfo Security, 2019, 19(3): 11-18.
|
|
王伟,沈旭东.基于实例的迁移时间序列异常检测算法研究[J].信息网络安全,2019,19(3):11-18.
|