全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

采用冒泡原理进行多轨迹识别的方法

DOI: 10.13190/jbupt.201001.74.zhuhl, PP. 74-79

Keywords: 多轨迹识别,冒泡原理,共享接入,网络监控

Full-Text   Cite this paper   Add to My Lib

Abstract:

References

[1]  Bellovin S M. A technique for counting NATted hosts//Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement. New York: ACM, 2002: 267-272.
[2]  Kohno T, Broido A, Claffy K C. Remote physical device fingerprinting[J]. IEEE Trans on Dependable and Secure Computing, 2005, 2(2): 93-108.
[3]  白雪, 钱步仁, 梁华庆. 一种检测NAT后主机数目的方案[J]. 计算机安全, 2009, 8(4): 46-48. Bai Xue, Qian Buren, Liang Huaqing. A scheme for counting NATed hosts[J]. Network and Computer Security, 2009, 8(4): 46-48.
[4]  辛阳, 刘利锋, 郑志彬, 等. 检测主机数量的方法、装置与系统及通信方法:中国, 200710096247.8. 2007-09-12.
[5]  王飞, 刘强, 程超, 等. 一种共享接入主机数目的检测方法和装置:中国,200910106030.X. 2009-08-12.
[6]  Spitzner L. Know your enemy: passive fingerprinting. Honeynet Project, 2003.
[7]  Beverly R. A robust classifier for passive TCP/IP fingerprinting//PAM 2004. Antibes: , 2004: 158-167.
[8]  Li Zhu, Yuan Ruixi, Guan Xiaohong. Accurate classification of the internet traffic based on the SVM method//ICC 2007. Glasgow: IEEE CS, 2007: 1373-1378.
[9]  Dornhoff L L, Hohn F E. Applied modern algebra[M]. New York: Macmillan Publishing Co, 1978: 201-202.
[10]  Stevens W R. TCP/IP illustrated (vol.1): the protocols[M]. Boston: Addison-Wesley Longman Publishing Co Inc, 1993: 24-27.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133