Author:
Luo Jian-Zhen,Yu Shun-Zheng
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference22 articles.
1. Agrawal R, Srikant R. Fast algorithms for mining association rules. In: Proceedings of the 20th international conference on VLDB, 1994. p. 487–99.
2. Mutual information-based feature selection for intrusion detection systems;Amiri;Journal of Network and Computer Applications,2011
3. Beddoe MA. Network protocol analysis using bioinformatics algorithms, 2004.
4. Caballero J, Poosankam P, Kreibich C, Song D. Dispatcher: enabling active Botnet infiltration using automatic protocol reverse-engineering. In: Proceedings of the 16th ACM conference on computer and communications security. New York, NY, USA: ACM; 2009. p. 621–34.
5. Caballero J, Yin H, Liang Z, Song D. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the 14th ACM conference on computer and communications security, CCS '07. New York, NY, USA: ACM; 2007. p. 317–29.
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献