Author:
Shi Yuanquan,Peng Xiaoning,Li Renfa,Zhang Yu
Reference35 articles.
1. Li, B., et al.: A survey of network flow applications. J. Netw. Comput. Appl. 36(2), 567–581 (2013)
2. Sperotto, A., et al.: An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutor. 12(3), 343–356 (2010)
3. Moore, A., Denis, Z., Crogan, M.: Discriminators for use in flow-based classification. Department of Computer Science, Queen Mary and Westfield College (2005)
4. Tan, Z., et al.: Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans. Comput. 64(9), 2519–2533 (2015)
5. Ahmed, M., Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献