[1] |
Odom W. Cisco CCENT/CCNA ICND1 100-101 official cert guide[M]. Indianapolis: Cisco Press, 2016.
|
[2] |
郭通, 兰巨龙, 李玉峰 . 基于量子自适应粒子群优化径向基函数神经网络的网络流量预测[J]. 电子与信息学报, 2013,35(9):2220-2226.
doi: 10.3724/SP.J.1146.2012.01343
|
|
Guo Tong, Lan Julong, Li Yufeng . Network traffic prediction based on quantum adaptive particle swarm optimization radial basis function neural network[J]. Journal of Electronics and Information, 2013,35(9):2220-2226.
doi: 10.3724/SP.J.1146.2012.01343
|
[3] |
Aubry F, Lebrun D, Vissicchio S , et al. SCMon: Leveraging segment routing to improve network monitoring [C].San Francisco:The IEEE International Conference on Computer Communications,IEEE, 2016.
|
[4] |
钱叶魁, 陈鸣, 叶立新 . 基于多尺度主成分分析的全网络异常检测方法[J]. 软件学报, 2012,23(2):361-377.
|
|
Qian Yekui, Chen Ming, Ye Lixin . Full network anomaly detection method based on multi-scale principal component analysis[J]. Journal of Software, 2012,23(2):361-377.
|
[5] |
Chen Wenji, Liu Yang, Guan Yong . Cardinality change-based early detection of large-scale cyber-attacks [C].Turin:Proceeding of IEEE Infocom, 2013.
|
[6] |
Bhuyan M H, Bhattacharyya D K, Kalita J K . Networkanomaly detection: methods, systems and tools[J]. IEEE Communications Surveys&Tutorials, 2014,16(1):303-336.
doi: 10.1109/TOH.2019.2925339
pmid: 31251195
|
[7] |
Zhang Jing Paschalidis,Loannis . Statistical anomaly detection via composite hypojournal testing for Markov models[J]. IEEE Transactions on Signal Processing, 2017,66(3):589-602.
doi: 10.1109/TSP.2017.2771722
|
[8] |
Agrawal S, Agrawal J . Survey on anomaly detection using data mining techniques[J]. Procedia Computer Science, 2015,60(1):708-713.
doi: 10.3390/s131012929
pmid: 24072029
|
[9] |
Mascaro S, Nicholso A E, Korb K B . Anomaly detection in vessel tracks using Bayesian networks[J]. International Journal of Approximate Reasoning, 2014,55(1):84-98.
doi: 10.1016/j.ijar.2013.03.012
|
[10] |
Ahmed T, Coates M, Lakhina A . Multivariate online anomaly detection using kernel recursive least squares [C].Alaska:Infocom IEEE International Conference on Computer Communications,IEEE, 2007.
|
[11] |
赵雷, 苏庆刚, 罗宜元 . 一种基于MIB信息熵统计的网络异常检测方法[J]. 上海电机学院学报, 2015,18(2):95-101.
|
|
Zhao Lei, Su Qinggang, Luo Yiyuan . Anetwork anomaly detection method based on MIB information entropy statistics[J]. Journal of Shanghai Dianji University, 2015,18(2):95-101.
|
[12] |
Qian Yekui, Chen Ming . Amatrix-based method for evaluating ISP network performance [C].Wuhan:International Workshop on Education Technology & Computer Science, 2009.
|
[13] |
王晓鸽 . 基于PGM-NMF的网络流量异常检测研究[J]. 电子科技, 2014,27(5):175-178.
|
|
Wang Xiaoge . Research on network traffic anomaly detection based on PGM-NMF[J]. Electronic Secience and Technology, 2014,27(5):175-178.
|
[14] |
Barford P, Duffield G N, Ron A , et al. Network Performance Anomaly Detection and Localization [C]. Rio de Janeiro:Infocom IEEE,IEEE, 2009.
|
[15] |
Grill M, Pevny M, Rehak M . Reducing false positives of network anomaly detection by local adaptive multivariate smoothing[J]. Journal of Computer & System Sciences, 2017,83(1):43-57.
doi: 10.1007/s11096-019-00949-6
pmid: 31865596
|
[16] |
Emma D, Pescape A, Ventre G . Analysis and experimentation of an open distributed platform for synthetic traffic generation [C].Sedona:IEEE International Workshop on Future Trends of Distributed Computing Systems,IEEE, 2004.
|