Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 323-327.
• Network & Communication • Previous Articles Next Articles
SHI Zhi-kai1,ZHU Guo-sheng1,2,LEI Long-fei1,CHEN Sheng1,ZHEN Jia1,WU Shan-chao1,WU Meng-yu1
CLC Number:
[1]STATISTA.Internet of Things (IoT) connected devices in- stalled base worldwide from 2015 to 2025 (in billions)[OL]. [2017-05-14].https://www.statista.com/statistics/471264/iot-numberof-connected-devices-worldwide. [2]Internet Live Stats.Internet Users[OL]. [2017-0514].http://www.internetlivestats.com/ internet-users/#trend. [3]NESSETT D M,GRABELSKY D,BORELLA M S,et al.Me- thod and system for locating network services with distributed network address translation:U.S. Patent 6,055,236.2000-4-25. [4]BELLOVIN S M.A technique for counting NATted hosts[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment.ACM,2002:267-272. [5]STRAKA K,MANES G. Passive detection of nat routers and client counting∥Advances in Digital Forensics II.Springer,Boston,MA,2006:239-246. [6]MAIER G,SCHNEIDER F,FELDMANN A.NAT usage in residential broadband networks[C]∥International Conference on Passive and Active Network Measurement.Springer,Berlin,Heidelberg,2011:32-41. [7]MONGKOLLUKSAMEE S,FUKUDA K,PONGPAIBOOL P.Counting NATted hosts by observing TCP/IP field behaviors[C]∥2012 IEEE International Conference on Communications (ICC).IEEE,2012:1265-1270. [8]ZHANG B,GUAN Y,NIU W,et al.A hybrid packet clustering approach for NAT host analysis[C]∥2015 IEEE International Conference on Communication Software and Networks(ICCSN).IEEE,2015:432-438. [9]RUI L,HONGLIANG Z,YANG X,et al.Remote NAT detect algorithm based on support vector machine[C]∥2009 International Conference on Information Engineering and Computer Science.2009. [10]ABT S,DLETZ C,BAIER H,et al.Passive remote source nat detection using behavior statistics derived from netflow[C]∥IFIP International Conference on Autonomous Infrastructure,Management and Security.Springer,Berlin,Heidelberg,2013:148-159. [11]GOKCEN Y,FOROUSHANI V A,HEYWOOD A N Z.Can we identify NAT behavior by analyzing Traffic Flows?[C]∥Security and Privacy Workshops (SPW),2014 IEEE.IEEE,2014:132-139. [12]KOMREK T,GRILL M,PEVNY T.Passive NAT detection using HTTP access logs[C]∥2016 IEEE International Workshop on Information Forensics and Security (WIFS).IEEE,2016:1-6. [13]BI J,ZHAO L,ZHANG M.Application presence fingerprinting for NAT-aware router[C]∥Knowledge-Based Intelligent Information and Engineering Systems.Springer Berlin/Heidelberg,2006:678-685. [14]The Bro Network Security Monitor[OL].http://www.bro. org. [15]HOLMES G,DONKIN A,WITTEN I H.Weka:A machine learning workbench∥Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems.IEEE,1994:357-361. |
[1] | WANG Ming, WU Wen-fang, WANG Da-ling, FENG Shi, ZHANG Yi-fei. Generative Link Tree:A Counterfactual Explanation Generation Approach with High Data Fidelity [J]. Computer Science, 2022, 49(9): 33-40. |
[2] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[3] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[4] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[5] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[6] | LI Xiao-wei, SHU Hui, GUANG Yan, ZHAI Yi, YANG Zi-ji. Survey of the Application of Natural Language Processing for Resume Analysis [J]. Computer Science, 2022, 49(6A): 66-73. |
[7] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[8] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[9] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[10] | ZHANG Hu, BAI Ping. Graph Convolutional Networks with Long-distance Words Dependency in Sentences for Short Text Classification [J]. Computer Science, 2022, 49(2): 279-284. |
[11] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
[12] | LI Zhao-qi, LI Ta. Query-by-Example with Acoustic Word Embeddings Using wav2vec Pretraining [J]. Computer Science, 2022, 49(1): 59-64. |
[13] | CHEN Zhi-yi, SUI Jie. DeepFM and Convolutional Neural Networks Ensembles for Multimodal Rumor Detection [J]. Computer Science, 2022, 49(1): 101-107. |
[14] | WU Lin, BAI Lan, SUN Meng-wei, GOU Zheng-wei. Algal Bloom Discrimination Method Using SAR Image Based on Feature Optimization Algorithm [J]. Computer Science, 2021, 48(9): 194-199. |
[15] | WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85. |
|