Computer Science ›› 2014, Vol. 41 ›› Issue (3): 153-158.
Previous Articles Next Articles
SHAO Xiu-li,GENG Mei-jie and JIANG Hong-ling
[1] Oikarinen J,Reed D.Internet relay chat protocol[R].Request forComment s (RFC) 1459,IETF,May 1993 [2] Jiang H,Shao X.Detecting P2P botnets by discovering flow dependency in C&C traffic[J].Peer-to-Peer Networking and Applications,2012,5:1-12 [3] 李晓桢,程佳,胡军.基于聚类分析的僵尸网络识别系统[J].计算机系统应用,2009,8:130-135 [4] 王威,方滨兴,崔翔.基于终端行为特征的IRC 僵尸网络检测[J].计算机学报,2009,32(10):1980-1988 [5] 蒋鸿玲,邵秀丽.基于神经网络的僵尸网络检测方法[J].智能系统学报,2013,8(2):113-118 [6] Goebel J,Holz T.Rishi:identify bot contaminated hosts by irc nickname evaluation[C]∥Proceedings of USENIX First Workshop on Hot Topics in Understanding Botnets.Cambridge,USA,2007:1-12 [7] 杜跃进,崔翔.僵尸网络及其启发[J].中国数据通信,2005,7(5):9-13 [8] Dean J,Ghemawat S.MapReduce:Simplified dtat process-ing on large cluster[J].Communications of the ACM,2005,51(1):107-113 [9] 陶永才,薛正元,石磊.基于MapReduce 的贝叶斯垃圾邮件过滤机制[J].计算机应用,2011,31(9):2412-2416 [10] 张鹏,唐世渭.朴素贝叶斯分类中的隐私保护方法研究[J].计算机学报,2007,0(8):1267-1276 |
No related articles found! |
|