共 54 条
- [31] Doucette J, 2008, LECT NOTES COMPUT SC, V4971, P266, DOI 10.1007/978-3-540-78671-9_23
- [32] Behavioral authentication of server flows [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 46 - 55
- [33] Erman Jeffrey., 2006, Proceedings of the 2006 SIGCOMM workshop on Mining Network Data, P281
- [34] Freund Y., 1999, Journal of Japanese Society for Artificial Intelligence, V14, P771
- [35] HAFFNER P., 2005, MINENET 05, P197
- [39] Lichodzijewski P., 2008, P GEN EV COMP C, P363
- [40] Madhukar A., 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, P179