[1]ANTONELLO R, FERNANDES S, KAMIENSKI C, et al. Deep packet inspection tools and techniques in commodity platforms: challenges and trends [J]. Journal of Network and Computer Applications, 2012, 35(6): 1863-1878.
[2]XU K, ZHANG M, YE M, et al. Identify P2P traffic by inspecting data transfer behavior [J]. Computer Communications, 2010, 33(10): 1141-1150.
[3]DEWAELE G, HIMURA Y, BORGNAT P, et al. Unsupervised host behavior classification from connection patterns [J]. International Journal of Network Management, 2010, 20(5): 317-337.
[4]ZHANG J, XIANG Y, ZHOU W, et al. Unsupervised traffic classification using flow statistical properties and IP packet payload [J]. Journal of Computer and System Sciences, 2013, 79(1): 573-585.
[5]AULD T, MOORE A W, GULL S F. Bayesian neural networks for Internet traffic classification [J]. IEEE Transactions on Neural Networks, 2007, 18(1): 223-239.
[6]GU C, ZHANG S. Network traffic classification based on improved support vector machine [J]. Chinese Journal of Science Instrument, 2011, 32(7): 1507-1513.(顾成杰,张顺颐.基于改进SVM的网络流量分类方法研究[J].仪器仪表学报,2011,32(7):1507-1513.)
[7]CALLADO A, KAMIENSKI C, SZABO G, et al. A survey on Internet traffic identification [J]. IEEE Communications Survey and Tutorials, 2009, 11(3): 37-52.
[8]GUAN X, YI X, SUN X, et al. Efficient fusion approach for conflicting evidence [J]. Journal of Tsinghua University: Science and Technology, 2009, 49(1): 138-141.(关欣,衣晓,孙晓明,等.有效处理冲突证据的融合方法[J].清华大学学报:自然科学版,2009,49(1): 138-141.)
[9]KRISHNAPURAM B, HARTERNINK A J, CARIN L, et al. A Bayesian approach to joint feature selection and classifier design [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004, 26(9): 1105-1111.
[10]FISCH D, HOFMANN A, SICK B. On the versatility of radial basis function neural networks: a case study in the field of intrusion detection [J]. Information Sciences, 2010, 180(12): 2421-2439.
[11]JIANG W, PENG J, DENG Y, New representation method of evidential conflict [J]. Systems Engineering and Electronics, 2010, 32(3): 562-565.(蒋雯,彭进业,邓勇.一种新的证据冲突表示方法[J].系统工程与电子技术,2010,32(3):562-565.)
[12]ZHANG J, QIAN Z, SHOU G, et al. Network traffic identification based on online clustering [J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(3): 103-106.(张剑,钱宗珏,寿国础,等.在线聚类的网络流量识别[J].北京邮电大学学报,2011,34(3):103-106.) |