共 25 条
- [1] Zhou Ji, Intelligent Manufacturing-the major direction of "Made in China 2025, Chinese Journal of Mechanical Engineering, 26, 17, pp. 2273-2284, (2015)
- [2] The white paper of industrial Internet platform security (2020)
- [3] Roughan M., Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification, Proc of the 4th ACM SIGCOMM Conf on Internet Measurement(IMC'04), pp. 135-148, (2004)
- [4] Wang Wei, Zhu Ming, Zeng Xuewen, Et al., Malware traffic classification using convolutional neural network for representation learning, Proc of 2017 Int Conf on Information Networking (ICOIN), pp. 712-717, (2017)
- [5] Pan Yuting, Lin Li, A trust-based DDoS discovery approach for encrypted traffic in cloud environment, Journal of Computer Research and Development, 58, 4, pp. 822-833, (2021)
- [6] Conti M, Mancini L, Spolaor R, Et al., Analyzing Android encrypted network traffic to identify user actions, IEEE Transactions on Information Forensics and Security, 11, 1, pp. 114-125, (2016)
- [7] Madhukar A, Williamson C., A longitudinal study of P2P traffic classification, Proc of the 14th IEEE Int Symp on Modeling, Analysis and Simulation, pp. 179-188, (2006)
- [8] Moore A W, Papagiannaki K., Toward the accurate identification of network applications, Proc of Int Workshop on Passive and Active Network Measurement, pp. 41-54, (2005)
- [9] Dewes C, Wichmann A, Feldmann A., An analysis of Internet chat systems, Proc of the 2003 SIGCOMM Conf on Internet Measurement, pp. 51-64, (2003)
- [10] Sen S, Spatscheck O, Wang D., Accurate, scalable in-network identification of P2P traffic using application signatures, Proc of the 2004 Int Conf on World Wide Web, pp. 512-521, (2004)