共 50 条
- [23] Approach of the security of enterprises' network [J]. Huadong Chuanbo Gongye Xueyuan Xuebao/Journal of East China Shipbuilding Institute, 2001, 15 (05): : 32 - 36
- [24] A Comprehensive Approach for Network Security [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
- [25] Improving network security by multipath traffic dispersion [J]. 2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 34 - 38
- [26] Security Evaluation of Hosts Based on Network Traffic [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 901 - 905
- [27] Network security management with traffic pattern clustering [J]. SOFT COMPUTING, 2014, 18 (09) : 1757 - 1770
- [28] Fuzzy Clustering of Network Traffic Features for Security [J]. 2015 IEEE 5TH SYMPOSIUM ON LARGE DATA ANALYSIS AND VISUALIZATION (LDAV), 2015, : 127 - 128
- [29] Mobile security agents for network traffic analysis [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 332 - 340
- [30] Network security management with traffic pattern clustering [J]. Soft Computing, 2014, 18 : 1757 - 1770