[1] ZHANG J, XIANG Y, WANG Y, et al. Network traffic classification using correlation information[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(1):104-117. [2] 赵国锋,吉朝明,徐川.Internet流量识别技术研究[J].小型微型计算机系统,2010,31(8):1514-1520.(ZHAO G F, JI C M, XU C. Survey of techniques for Internet traffic identification[J]. Journal of Chinese Computer Systems, 2010, 31(8):1514-1520.) [3] YAN Z, TRACY C, VEERARAGHAVAN M, et al. A network management system for handling scientific data flows[J]. Journal of Network and Systems Management, 2016, 24(1):1-33. [4] ALSHAMMARI R, ZINCIR-HEYWOOD A N. How robust can a machine learning approach be for classifying encrypted VoIP[J]. Journal of Network and Systems Management, 2015, 23(4):830-869. [5] FRANCFORT S, LIU T, GHAFARI J, et al. Extreme learning machines for Internet traffic classification[EB/OL].[2016-01-02]. https://www.researchgate.net/publication/261985712_Extreme_Learning_Machines_for_Internet_Traffic_Classification. [6] HUANG G B, CHEN L, SIEW C K. Universal approximation using incremental constructive feedforward networks with random hidden nodes[J]. IEEE Transactions on Neural Networks, 2006, 17(4):879-892. [7] HUANG G B. What are extreme learning machines? Filling the gap between Frank Rosenblatt's dream and John von Neumann's puzzle[J]. Cognitive Computation, 2015, 7(3):263-278. [8] YANG X, CHEN S, CHEN B. Plane-Gaussian artificial neural network[J]. Neural Computing and Applications, 2012, 21(2):305-317. [9] BRADLEY P S, MANGASARIAN O L. k-plane clustering[J]. Journal of Global Optimization, 2000, 16(1):23-32. [10] MOORE A, ZUEV D, CROGAN M. Discriminators for use in flow-based classification[EB/OL].[2016-02-03]. https://qmro.qmul.ac.uk/xmlui/bitstream/handle/123456789/5050/RR-05-13.pdf?sequence=1. [11] BARTLETT P L. The sample complexity of pattern classification with neural networks:the size of the weights is more important than the size of the network[J]. IEEE Transactions on Information Theory, 1998, 44(2):525-536. |