您当前的位置:
首页 >
文章列表页 >
Flow-awared identification model of sophisticated network application
Academic paper | 更新时间:2024-06-05
    • Flow-awared identification model of sophisticated network application

    • Journal of Communications   Vol. 36, Issue 3, Pages: 161-169(2015)
    • DOI:10.11959/j.issn.1000-436x.2015070    

      CLC: TP393
    • Online First:2015-03

      Published:25 March 2015

    移动端阅览

  • Luo-shi ZHANG, Da-wei WANG, Yi-bo XUE. Flow-awared identification model of sophisticated network application[J]. Journal of Communications, 2015, 36(3): 161-169. DOI: 10.11959/j.issn.1000-436x.2015070.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1167

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Vector space embedding of DNS query behaviors by deep learning
Improved space protocol identification algorithm

Related Author

Cheng-cheng MAI
Bo CHEN
Jia-kun ZHOU
Ling YU
Chang-ling ZHOU
Xing-long LUAN
Jian-guo XIAO
Tian-ming ZHENG

Related Institution

School of Computer Science and Technology,Nanjing Normal University
Jiangsu Provincial Key Laboratory for Numerical of Large Scale Complex System
Computer Center,Peking University
School of Electronics Engineering and Computer Scie ng University
Institute of Computer Science & Technology,Peking University
0