共 3 条
[3]
Generating realistic workloads for network intrusion detection systems[J] . Spyros Antonatos,Kostas G. Anagnostakis,Evangelos P. Markatos.ACM SIGSOFT Software Engineering Notes . 2004 (1)