您当前的位置:
首页 >
文章列表页 >
Clustering perception mining of network protocol’s stealth attack behavior
Papers | 更新时间:2024-06-05
    • Clustering perception mining of network protocol’s stealth attack behavior

    • Journal on Communications   Vol. 38, Issue 6, Pages: 39-48(2017)
    • DOI:10.11959/j.issn.1000-436x.2017123    

      CLC: TP393
    • Online First:2017-06

      Published:25 June 2017

    移动端阅览

  • Yan-jing HU, Qing-qi PEI. Clustering perception mining of network protocol’s stealth attack behavior[J]. Journal on Communications, 2017, 38(6): 39-48. DOI: 10.11959/j.issn.1000-436x.2017123.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1494

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Mining and utilization of network protocol’s stealth attack behavior

Related Author

Yan-jing HU
Qing-qi PEI

Related Institution

Network and Information Security Key Laboratory,Engineering University of the Armed Police Force
National Key Laboratory of Integrated Services Networks,Xidian University
0