Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 361-364.doi: 10.11896/j.issn.1002-137X.2016.6A.086
Previous Articles Next Articles
YI Jun-kai, LI Zheng-dong and LI Hui
[1] 文伟平,梅瑞,宁戈,等.Android恶意软件检测技术分析和应用研究[J].通信学报,2014,35(8):78-85 [2] 杨欢,张玉清,胡予濮,等.基于多类特征的Android应用恶意行为检测系统[J].计算机学报,2014,37(01):15-27 [3] 周裕娟,张红梅,张向利,等.基于Android权限信息的恶意软件检测[J].计算机应用研究,2015,32(10) [4] Carela-Espaol V,Barlet-Ros P,Bifet A,et al.A streaming flow-based technique for traffic classification applied to 12+1 years of Internet traffic[J].Telecommunication Systems,2015:1-14 [5] Divakaran D M,Su L,Liau Y S,et al.SLIC:Self-Learning Intelligent Classifier for Network Traffic[J].Computer Networks,2015,91:283-297 [6] Chen Z,Liu Z,Peng L,et al.A novel semi-supervised learning method for Internet application identification[J].Soft Computing,2015:1-13 [7] Groleat T,Arzel M,Vaton S.Stretching the Edges of SVMTraffic Classification With FPGA Acceleration[J].IEEE Transactions on Network & Service Management,2014,11(3):278-291 [8] Tegeler F,Fu X,Vigna G,et al.BotFinder:finding bots in network traffic without deep packet inspection[C]∥Proc Co-next.2012:349-360 [9] Wang B,Chua K C,Srinivasan V,et al.Information Coverage in Randomly Deployed Wireless Sensor Networks[J].IEEE Transactions on Wireless Communications,2007,6(8):2994-3004 [10] Narayanan V A,Sureshkumar V,Rajeswari A.Automatic Traffic Classification Using Machine Learning Algorithm for Policy-Based Routing in UMTS-WLAN Interworking[M]∥Artificial Intelligence and Evolutionary Algorithms in Engineering Systems.Springer India,2015:305-312 |
No related articles found! |
|