Computer Science ›› 2015, Vol. 42 ›› Issue (1): 164-169.doi: 10.11896/j.issn.1002-137X.2015.01.038
Previous Articles Next Articles
XING Meng, WU Yang, WANG Tao and LI Jin-dong
[1] 龙文,马坤,辛阳,等.适用于协议特征提取的关联规则改进算法[J].电子科技大学学报,2010,9(2):302-305 [2] Charles V W,Fabian M,Gerald M M.On inferring application protocol behaviors in encrypted network traffic[J].Journal of Machine Learning Research,2006,7(12):2745-2769 [3] Sun Guang-lu,Xue Yi-bo,Dong Ying-fei,et al.A Novel Hybrid Method for Effectively Classifying Encrypted Traffic[C]∥Proceedings of Communications and Systems Security,2010, GLOBECOM 2010.Miami USA,2010 IEEE,2010:1-5 [4] Talieh S T,Mostafa A,Fakhri K,et al.Machine Learning-Based Classification of Encrypted Internet Traffic[C]∥8th International Conference,MLDM 2012.Berlin,Germany,2012:578-592 [5] Zhang Meng,Zhang Hong-li,Zhang Bo.Encrypted Traffic Classification Based on an Improved Clustering Algorithm[C]∥International Conference,ISCTCS 2012.Beijing,China,2012:124-131 [6] Du Ye,Zhang Ru-hui.Design of a method for encrypted P2P traffic identification using K-means algorithm [J].Telecommunication Systems,2013,53(1):163-168 [7] 赵博,郭虹,刘勤让,等.基于加权累积和检验的加密流量盲识别算法[J].软件学报,2013,24(6):1334-1345 [8] Menezes A J,Van O P C,Vanstone S A.应用密码学手册 [M].胡磊,王鹏,等译.北京:电子工业出版社,2005:1-4 [9] NIST FIPS PUB 140-2-2001.Security Requirements for Cryptographic Modules[S].Washington DC,USA:National Institute of Standards and Technology,2001 [10] NIST SP800-22.A Statistical Test Suite for Random and Pseu-dorandom Number Generators for Cryptographic Applications Revision 1a[S].Washington DC,USA:National Institute of Standards and Technology,2010 [11] 徐晶,于向军.基于FFT算法的震动信号分析[J].工业控制计算机,2005,18(12):8-9 |
No related articles found! |
|