Logg C. Characterization of the traffic between SLAC and the Internet. .
[2]
Moore D, Keys K, Koga R, et al. Claffy CoralReef software suite as a tool for system and network administrators//Burgess M. Proceedings of the LISA 2001 15th Systems Administration Conference. San Diego: USENIX, 2001: 133-144.
[3]
San S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures//Proceeding of the 13th Internation World Wide Web Conference. NY: ACM Press, 2004: 512-521.
[4]
Haffner P, Sen S, Spatscheck O, et al. ACAS: automated construction of application signatures//ACM SIGCOMM Workshop on MineNet 2005. Philadelphia: ACM Press, 2005: 197-202.
Moore A W, Zuev D. Internet traffic classification using Bayesian analysis techniques//ACM SIGMETRICS. New York: ACM Press, 2005: 50-60.
[7]
Auld T, Moore A W, Gull S F. Bayesian neural networks for Internet traffic classification[J]. IEEE Trans on Neural Network, 2007, 18(1):223-239.
[8]
Okabe T, Kitamura T, Shizuno T. Statistical traffic identification method based on flow-level behavior for fair VoIP service//IEEE Workshop on VoIP Management and Security. Vancouver: IEEE Press, 2006: 35-40.
[9]
Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: multilevel traffic classification in the dark//ACM SIGCOMM 2005. Philadelphia: ACM Press, 2005: 229-240.
[10]
Webb A R. Statistical pattern recognition[M]. 2nd ed. England: Wiley, 2004: 161-162.