Kim H, Karp B. Autograph: toward automated, distributed worm signature detection//Proceedings of the 13th conference on USENIX Security Symposium. Berkeley: USENIX Association, 2004.
[3]
Singh S, Estan C, Varghese G, et al. Automated worm fingerprinting//Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation. Berkeley: USENIX Association, 2004.
[4]
Patrick Haffner. ACAS: automated construction of application signatures//Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data. New York: ACM, 2005: 197-202.
[5]
Ye Mingjiang, Xu Ke, Wu Jianping. Auto sig-automatically generating signatures for applications//IEEE International Conference on Computer and Information Technology. Xiamen: , 2009: 104-109.
[6]
Yang Jie, Ma Jing. Signature based identification of P2P streaming media traffic//2010 2nd International Conference on Intellectual Technology in Industrial Practice. China: Institute of Electrical and Electronics Engineers, 2010: 308-312.