Computer Science ›› 2013, Vol. 40 ›› Issue (6): 108-110.
Previous Articles Next Articles
YAN Fen,CHEN Shuang-shuang and YIN Xin-chun
[1] 陈宇峰.蠕虫模拟方法和检测技术研究[D].杭州:浙江大学,2006 [2] 汪伟.网络蠕虫检测技术研究与实现[D].杭州:浙江大学,2006 [3] Chen Yu-feng,Dong Ya-bo,Lu Dong-ming,et al.Detecting randomly scanning worms based on heavy-tailed property[C]∥Proc.of 2005IEEE International Conference on Networking,Sensing and Control.Orlando,Florida,2005:354-358 [4] 肖枫涛.基于网络行为的蠕虫检测关键技术研究[D].长沙:国防科技大学,2009 [5] Robertson S,Siegel E V,Miller M,et al.Surveillance detection in high bandwidth environments[C]∥Proc.of DARPA DISCEX 111Conefrence.2003:130-139 [6] Jung J,Paxson V,Begrer A W,et al.Fast Portscan detection using sequential hypothesis testing[C]∥Proc.of the IEEE Symposium on Security and Privacy.2004:211-225 [7] 付文,魏博,赵荣彩,等.基于模糊推理的程序恶意性分析模型研究[J].通信学报,2010,1(1):44-50 [8] 刘向杰,夏靖波,柴天佑.一类基于正态分布隶属函数的模糊控制策略研究[J].控制与决策,1998,13(4):365-368 [9] 顾雨婕.用于行为分析反木马的模糊分类算法研究[D].杭州:浙江工业大学,2008 [10] 李鸿吉.模糊数学基础及实用算法[M].北京:科学出版社.2005 [11] Moskovitch R,Elovici Y,Rokach L.Detection of unknown computer worms based on behavioral classification of the host[J].Computational Statistics & Data Analysis,2008,52(9):4544-4566 [12] 李晶皎,赵丽红,王爱侠.模式识别[M].北京:北京电子工业出版社,2010 [13] 况晓辉,黄敏桓,许飞.网络蠕虫实验环境构建技术研究[J].计算机科学,2010,7(7):54-56,3 |
No related articles found! |
|