共 50 条
- [31] An Analysis of Anonymity in Bitcoin Using P2P Network Traffic [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 469 - 485
- [33] Survey on P2P Traffic Managements [J]. PROCEEDINGS OF THE 2011 2ND INTERNATIONAL CONGRESS ON COMPUTER APPLICATIONS AND COMPUTATIONAL SCIENCE, VOL 2, 2012, 145 : 191 - 196
- [34] Identifying P2P traffic: A survey [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 1182 - 1203
- [35] Traffic Anomaly Detection in the Presence of P2P Traffic [J]. 2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 482 - 485
- [36] Identifying P2P traffic: A survey [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (05) : 1182 - 1203
- [37] A Novel Method of P2P Traffic Classification Based on TCP Flow Analysis [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL II, 2010, : 492 - 495
- [38] Towards Cost-Effective P2P Traffic Classification in Cloud Environment [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (12): : 2888 - 2897
- [39] UDP based P2P Game Traffic Classification with Transport Layer Behaviors [J]. 2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 687 - 691