共 50 条
- [41] Network Traffic and Security Event Collecting System [J]. PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL SYSTEMS, TECHNOLOGY AND INFORMATION 2015 (ICESTI 2015), 2016, 365 : 439 - 446
- [42] Network traffic analysis and security monitoring with UniMon [J]. ATM 2000: PROCEEDINGS OF THE IEEE CONFERENCE 2000 ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2000, : 439 - 446
- [43] Generating realistic network traffic for security experiments [J]. PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, : 200 - 207
- [44] Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 2107 - 2112
- [45] Cache-based network processor architecture: Evaluation with real network traffic [J]. IEICE TRANSACTIONS ON ELECTRONICS, 2006, E89C (11): : 1620 - 1628
- [47] Classification of Network Traffic Using Fuzzy Clustering for Network Security [J]. ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, ICDM 2017, 2017, 10357 : 278 - 285
- [48] A Survey of Network Traffic Visualization in Detecting Network Security Threats [J]. TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
- [49] Recognition Method and Evaluation of Traffic Signs Based on Capsule Network [J]. CICTP 2020: TRANSPORTATION EVOLUTION IMPACTING FUTURE MOBILITY, 2020, : 376 - 388
- [50] On Performance Evaluation of Various Traffic Combination based on Network Calculus [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 381 - 386