陈亮, 龚俭, 徐选. 基于特征串的应用层协议识别[J]. 计算机工程与应用, 2006, 24: 16-19. Chen Liang, Gong Jian, Xu Xuan. Identification of application-level protocols using characteristics[J]. Journal of Computer Engineering and Application, 2006, 24: 16-19.
[3]
陈曙晖, 苏金树. 基于内容分析的协议识别研究[J]. 国防科技大学学报, 2008, 30(4): 82-87. Chen Shuhui, Su Jinshu. Identification research based on content analysis[J]. Journal of National University of Defence Technology, 2008, 30(4): 82-87.
[4]
邹艳, 陆佩忠. 关键方程的新推广[J]. 计算机学报, 2006, 29(5): 712- 718. Zou Yan, Lu Peizhong. A new generalization of key equation[J]. Chinese Journal of Computers, 2006, 29(5): 712-718.
[5]
Wang Fenghua, Huang Zhitao. A method for blind recognition of convolution code based on euclidean algorithm//WCNMC 2007. Shanghai: IEEE Press, 2007: 1414-1417.
[6]
刘健, 王晓君, 周希元. 基于Walsh- Hadamard 变换的卷积码盲识别[J]. 电子与信息学报, 2010, 32(4): 884-888. Liu Jian, Wang Xiaojun, Zhou Xiyuan. Blind recognition of convolutional coding based on Walsh-Hadamard transform[J]. Journal of Electronics & Information Technology, 2010, 32(4): 884-888.
[7]
周亚建, 刘健. (n, n-1, m)卷积码的盲识别[J]. 北京邮电大学学报, 2010, 33(3): 135-138. Zhou Yajian, Liu jian. A blind recognition of the (n, n-1, m) convolution code[J]. Journal of Beijing University Posts and Telecommunications, 2010, 33(3): 135-138.