共 22 条
- [1] The 38th statistical report on Internet development in China
- [2] The CAIDA Anonymized Internet Traces 2016 Dataset, (2016)
- [3] Perta V.C., Barbera M.V., Mei A., Exploiting Delay Patterns for User IPs Identification in Cellular networks, Privacy Enhancing Technologies, pp. 224-243, (2014)
- [4] Peng C., Li C., Tu G., Et al., Mobile data charging: New attacks and countermeasures, Proc of the 19th ACM Conf on Computer and Communications Security, pp. 195-204, (2012)
- [5] Wen K., Yang J., Cheng F., Et al., MIL-RoQ: Monitoring, identifying and locating the RoQ attack in backbone network, Journal of Computer Research and Development, 52, 4, pp. 813-822, (2015)
- [6] Zhao X., Xia J., Fu K., Et al., Frequent items mining algorithm over network flows at high-speed network, Journal of Computer Research and Development, 51, 11, pp. 2458-2469, (2014)
- [7] Zhang Y., Rvidsson A., Understanding the characteristics of cellular data traffic, ACM SIGCOMM Computer Communication Review, 42, 4, pp. 461-466, (2012)
- [8] Zhang Y., Arvidsson A., Siekkinen M., Et al., Understanding HTTP flow rates in cellular networks, Proc of the 13th IFIP Int Conf on Networking, pp. 1-8, (2014)
- [9] Xu Y., Wang Z., Leong W.K., Et al., An end-to-end measurement study of modern cellular data networks, Passive and Active Measurement, pp. 34-45, (2014)
- [10] Chen X., Zhang L., Xiang X., Et al., End-to-end delay analysis of LTE networks based on random network computing, Chinese Journal of Computers, 35, 1, pp. 46-52, (2012)