[1] EDWARD W.信息战原理与实战[M].吴汉平,译.北京:电子工业出版社,2003:1-20. (EDWARD W. Information Warfare:Principles and Operations[M]. WU H P, translated. Beijing:Publishing House of Electronics Industry, 2003:1-20.). [2] LI F, LI T, ZHANG C-R, et al. Length identification of unknown data frame[C]//ICCIS 2012:Proceedings of the Eighth International Conference on Computational Intelligence and Security. Washington, DC:IEEE Computer Society, 2012:674-677. [3] BAI Y, YANG X J, ZHANG Y. A recognition method of m-sequence synchronization codes using higher-order statistical processing[J]. Journal of Electronics and Information Technology, 2012, 34(1):33-37. [4] MATSUZAWA A, HIGUCHI M, JONAH G, et al. The judgment of document similarities orthogonal transformations and improvement of the property[J]. International Journal of Circuits, Systems and Signal Processing, 2012, 6(1):65-74. [5] 金陵.面向比特流的未知帧头识别技术研究[D]. 上海:上海交通大学,2011:29-39. (JIN L. Study on bit stream oriented unknown frame head identification[J]. Shanghai:Shanghai Jiao Tong University, 2011:29-39.). [6] 王和洲,薛开平,洪佩琳,等.基于频繁统计和关联规则的未知链路协议比特流切割算法[J].中国科技大学学报,2013,43(7):554-560. (WANG H Z, XUE K P, HONG P L, et al. An unknown link protocol bit stream segmentation algorithm based on frequent statistics and association rules[J]. Journal of University of Science and Technology of China, 2013, 43(7):554-560.). [7] 温爱霞.比特流数据未知协议特征发现技术研究[D].成都:电子科技大学,2016:33-45. (WEN A X. The technology research of feature selection for unknown protocol in the form of bit stream[D]. Chengdu:University of Electronic Science and Technology, 2015:33-45.). [8] 琚玉建,谢绍斌,张薇.基于自适应权值的数据报指纹特征识别与发现[J].计算机测量与控制,2014,22(7):2288-2290. (JU Y J, XIE S B, ZHANG W. Identification of data fingerprint characteristics based on self-adaptive weights[J]. Computer Measurement & Control, 2014, 22(7):2288-2290.). [9] 郑洁,朱强.未知单协议数据帧的地址分析与研究[J].计算机科学,2015,42(11):184-187. (ZHENG J, ZHU Q. Analysis and research on address message of unknown single protocol data frame[J]. Computer Science, 2015, 42(11):184-187.). [10] RICHARD S W. TCP/IP详解卷1:协议[M].范建华,胥光辉,张涛,等译.北京:机械工业出版社,2008:1-13. (RICHARD S W. TCP/IP Illustrated Volume 1:The Protocols[M]. FAN J H, XU G H, ZHANG T, et al, translated. Beijing:China Machine Press, 2008:1-13.). [11] 吴艳梅.无线环境下比特流协议帧定位与特征分析[D].成都:电子科技大学, 2014:10-11. (WU Y M. The frame location and protocol feature analysis from the bit-stream in the wireless network[D]. Chengdu:University of Electronic Science and Technology, 2014:10-11.). [12] TANENBAUM A S, WETHERALL D J. 计算机网络[M]. 严伟,潘爱民,译.5版.北京:清华大学出版社, 2012:153-156. (TANENBAUM A S, WETHERALL D J. Computer Networks[M]. YAN W, PAN A M, translated. 5th ed. Beijing:Tsinghua University Press, 2012:153-156.). [13] 鲍震.高速网络入侵监测系统模式匹配算法的研究与实现[D].长沙:国防科学技术大学,2007:10-20. (BAO Z. Research and implementation of pattern matching algorithms based high-speed network intrusion detection system[D]. Changsha:National University of Defense Technology, 2007:10-20.). [14] KNUTH D E, MORRIS J H, Jr, PRATT V R. Fast pattern matching in strings[J]. SIAM Journal on Computing 1977, 6(2):323-350. [15] BOYER R S, MOORE J S. A fast string searching algorithm[J]. Communications of the ACM, 1977, 20(10):762-772. [16] 王和洲.面向比特流的链路协议识别与分析技术[D].合肥:中国科学技术大学,2014:16-17. (WANG H Z. Research on bit-stream oriented link protocol identification and analysis techniques[D]. Hefei:University of Science and Technology of China, 2014:16-17.). [17] 蔡晓妍,戴冠中,杨黎斌.改进的多模式字符串匹配算法[J].计算机应用,2007,27(6):1415-1418. (CAI X Y, DAI G Z, YANG L B. Improved multiple patterns string matching algorithm[J]. Journal of Computer Applications, 2007, 27(6):1415-1418.). [18] 万国根,秦志光.改进的AC-BM字符串匹配算法[J].电子科技大学学报,2006,35(4):531-534. (WAN G G, QIN Z G. Improved AC-BM algorithm for matching multiple strings[J]. Journal of University of Electronic Science and Technology of China, 2006, 35(4):531-534.). [19] 张鑫,谭建龙,程学旗.一种改进的Wu-Manber多关键词匹配算法[J].计算机应用,2003,23(7):29-32. (ZHANG X,TAN J L,CHEGN X Q.An improved Wu-Manber multiple patterns match algorithm[J].Journal of Computer Applications,2003,23(7):29-32.) |