[1] |
Zhao Rui.The study and implement of P2P flow identify based characteristic string[D]. Chengdu:University of Electronic Science and Technology of China, 2009.(in Chinese)
|
[2] |
Lu Gang, Zhang Hongli, Ye Lin. P2P traffic identify[J]. Journal of Software,2011,22(6):12811298.(in Chinese)
|
[3] |
Sen S, Spatscheck O, Wang D M. Accurate, scalable innetwork identification of P2P traffic using application signatures[C]∥Proc of the 13th International Conference on World Wide Web (WWW 2004), 2004:512521.
|
[4] |
Karagiannis T,Broido A,Faloutsos M,et al.Transport layer identification of P2P traffic[C]∥Proc of the 4th ACM SIGCOMM Conference on Internet Measurement, 2004:1.
|
[5] |
Gallagher B,Iliofotou M,EliassiRad T,et al.Link homophily in the application layer and its usage in traffic classification[C]∥Proc of the INFOCOM, 2010:15.
|
[6] |
Bernaille L, Teixeira R, Akodkenou I, et al. Traffic classification on the fly[J]. ACM SIGCOMM Computer Communication Review, 2006, 36(2):2326.
|
[7] |
Bernaille L, Teixeira R, Salamatian K. Early application identification[C]∥Proc of the 2006 ACM CoNEXT Conference, 2006:112.
|
[8] |
Moore A W,Zuev D.Internet traffic classification using Bayesian analysis techniques[J]. ACM SIGMETRICS Performance Evaluation Review, 2005,33(1):5060.
|
[9] |
Xu P, Liu Q, Lin S. Internet traffic classification using support vector machine[J]. Journal of Computer Research and Development, 2009,46(3):407414.(in Chinese)
|
[10] |
Thornburgh M C. Adobe's secure realtime media flow protocol[EB/OL].[20140501].http://tools.ietf.org/html/rfc7016.
|
[11] |
Kaufman M.RTMFP overview for IETF77 TSV AREA[EB /OL].[20140501].http://www.ietf.org/proceedings/10mar/slides/tsvarea1.pdf.
|
[12] |
Flandrin P.Wavelet analysis and synthesis of fractional Brownian motion[J]. IEEE Transactions on Information Theory, 1992,38(2):910917.
|
[13] |
Liu J,Huang Y L.Nonlinear network traffic prediction based on BP neural network[J]. Journal of Computer Applications, 2007,27(7):17701772.(in Chinese)
|
[14] |
Lu J J, Wang Z Q. Prediction of network traffic flow based on chaos characteristics[J]. Journal of Nanjing University of Aeronautics & Astronautics, 2006,38(2):217221. (in Chinese)
|
[15] |
Wang Z X, Sun Y G, Chen Z Q, et al. Study of predicting network traffic using fuzzy neural networks[J]. Journal on Communications, 2005,26(3):136140.(in Chinese)
|
[16] |
Wang Liming,Wang Lian, Yang Nan. Application time sequence analysis[M].Shanghai:Publisher of University of Fudan,2009.(in Chinese)
|
[17] |
Paxson V,Floyd S. Widearea traffic:The failure of Poisson modeling[J]. IEEE/ACM Transactions on Networking, 1995,3(3):226244.
|
[18] |
Hong Fei, Wu Zhimei.Adaptive Hurst index estimator based on wavelet[J]. Journal of Software, 2005, 16(9):16851689.(in Chinese)
|
[19] |
Huang N E, Shen Z, Long S R. The empirical mode decomposition and the Hilbert spectrum for nonlinear and nonstationary time series analysis[C]∥Proc of Royal Soc London A, 1998:903995.
|
[20] |
Gao Bo, Zhang Qinyu, Liang Yongsheng, et al. Predicting selfsimilar networking traffic based on EMD and ARMA [J]. Journal on Communications, 2011, 32(4):4756.(in Chinese)
|
|
附中文参考文献:
|
[1] |
赵瑞.基于特征串的P2P流量识别研究与实现[D]. 成都:电子科技大学,2009.
|
[2] |
鲁刚,张宏莉,叶麟. P2P流量识别[J]. 软件学报,2011,22(6):12811298.
|
[13] |
刘杰,黄亚楼.基于BP神经网络的非线性网络流量预测[J].计算机应用,2007,27(7):17701772.
|
[14] |
陆锦军,王执铨.基于混沌特性的网络流量预测[J].南京航空航天大学学报,2006,38(2):217221.
|
[15] |
王兆霞,孙雨耕,陈增强,等.基于模糊神经网络的网络业务量预测研究[J].通信学报,2005,26(3):136140.
|
[16] |
王黎明,王连,杨楠.应用时间序列分析[M].上海:复旦大学出版社,2009.
|
[18] |
洪飞,吴志美. 基于小波的Hurst指数自适应估计方法[J]. 软件学报,2005,16(9):16851689.
|
[20] |
高波,张钦宇,梁永生,等. 基于EMD及ARMA的自相似网络流量预测[J]. 通信学报,2011,32(4):4756.
|