共 50 条
- [41] Improving network security by multipath traffic dispersion 2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 34 - 38
- [42] Security Evaluation of Hosts Based on Network Traffic 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 901 - 905
- [43] Fuzzy Clustering of Network Traffic Features for Security 2015 IEEE 5TH SYMPOSIUM ON LARGE DATA ANALYSIS AND VISUALIZATION (LDAV), 2015, : 127 - 128
- [45] Mobile security agents for network traffic analysis DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 332 - 340
- [46] Network Traffic and Security Event Collecting System PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL SYSTEMS, TECHNOLOGY AND INFORMATION 2015 (ICESTI 2015), 2016, 365 : 439 - 446
- [47] Network security management with traffic pattern clustering Soft Computing, 2014, 18 : 1757 - 1770
- [48] Generating realistic network traffic for security experiments PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, : 200 - 207
- [49] Network traffic analysis and security monitoring with UniMon ATM 2000: PROCEEDINGS OF THE IEEE CONFERENCE 2000 ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2000, : 439 - 446
- [50] Manipulation of Network Traffic Traces for Security Evaluation 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 1124 - +