1. Lai, J. B., Wang, H. Q., & Jin, S. (2007). Study of network security situation awareness system based on Netflow. Application Research of Computers, 24(8), 167–172.
2. Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567–581.
3. Zhang, H. (2009). Study on the TOPN abnormal detection based on the netflow data set. Computer and Information Science, 2(3), 103–108.
4. Hsiao HW, Chen DN, Wu TJ. (2010). Detecting hiding malicious website using network traffic mining approach. In 2nd international conference on education technology and computer (ICETC),vol. 5, V5-276-V5-280
5. Yin K and Zhu J. (2011). A novel DoS detection mechanism, in 2011 international conference on mechatronic science, electric engineering and computer (MEC), 296-298.