共 50 条
- [1] Security Evaluation of Hosts Based on Network Traffic [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 901 - 905
- [2] Investigating Application Behavior in Network Traffic Traces [J]. 2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2013, : 72 - 79
- [3] Toward Highly Reliable Network Traffic Traces [J]. 2013 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA'13), 2013,
- [4] Generation of high bandwidth network traffic traces [J]. MASCOTS 2002: 10TH IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATIONS SYSTEMS, PROCEEDINGS, 2002, : 401 - 410
- [5] Performance evalution of open-source software for traffic traces manipulation and analysis [J]. INFOCOMMUNICATIONS JOURNAL, 2012, 4 (03): : 1 - 8
- [6] Traffic Management and Security in Wired Network [J]. INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY, ICICCT 2018, 2019, 835 : 17 - 30
- [8] Security by Simple Network Traffic Monitoring [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 201 - 204
- [9] A Unified Approach to Network Traffic and Network Security Visualisation [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 614 - 619
- [10] Network Security: Approach Based on Network Traffic Prediction [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 41 - 55