共 50 条
- [31] Security Requirements Planning To Anticipate The Traffic Flooding On The Backbone Network Proceeding of 2015 1st International Conference on Wireless and Telematics (ICWT), 2015,
- [33] HADOOP-BASED NETWORK TRAFFIC ANOMALY DETECTION IN BACKBONE 2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 140 - 145
- [34] A mechanism for admission control of the input traffic to the UMTS backbone network 2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 823 - 827
- [35] Traffic characterization of network attack flows on the Internet backbone links IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 335 - 338
- [36] A methodology for analyzing backbone network traffic at stream-level 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 98 - 102
- [37] Network traffic anomalies detection and identification with flow monitoring 2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2008, : 235 - +
- [38] Uncovering network traffic anomalies based on their sparse distributions Science China Information Sciences, 2014, 57 : 1 - 11
- [40] Using Machine Learning to Analyze Network Traffic Anomalies PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 2344 - 2348