[1] |
Qin Tao, Wang Lei, Liu Zhaoli, et al.Robust application identification methods for P2P and VoIP traffic classification in backbone networks[J].KnowledgeBased Systems,2015,82(7):152162.
|
[2] |
Ye W,Cho K.Hybrid P2P traffic classification with heuristic rules and machine learning[J].Soft Computing,2014,18(9):18151827.
|
[3] |
Zhu A.A P2P network traffic classification method based on C4.5 decision tree algorithm[C]∥Proc of the 9th International Symposium on Linear Drives for Industry Applications,2014:373379.
|
[4] |
Khalife J,Verdejo J,Hajjar A.Performance of open DPI in identifying sampled network traffic[J].Journal of Networks,2014,8(2):7181.
|
[5] |
Du Jiang,Long Tao.P2P traffic identification research based on the SVM[C]∥Proc of the 22nd Wireless and Optical Communication Conference,2013:683686.
|
[6] |
Gu Bin, Zheng Guansheng, Wang Jiandong.Analysis for incremental and decrementalstandard support vector machine[J].Journal of Software,2013,24(7):16011613.(in Chinese)
|
[7] |
Zheng Jun,Shen Furao,Fan Hongjun.An online incremental learning support vector machine for largescale data[J].Neural Comput and Applications,2013,22(5):10231035.
|
[8] |
Crammer K,Singer Y.On the algorithmic implementation ofmulticlass kernelbased vector machines[J].Journal of Machine Learning Research,2013,11(5):265292.
|
[9] |
Hong W K,Hansson A,Deng J W.Relay autotuning of PID controllers using iterative feedback tuning[J].Automatica,2013,39(1):149157.
|
[10] |
Hong Y, Huang C, Yan J. Applying control theoretic approach to mitigate SIP overload[J].Telecommunication Systems,2013,54(4):387404.
|
[11] |
Zink T,Waldvogel M.Bittorrent traffic obfuscation:A chase towards semantic traffic identification[C]∥Proc of the 12th IEEE International Conference on PeertoPeer Computing,2012:126137.
|
[12] |
Hu L, Zhang L. Realtime internet traffic identification based on decision trees[C]∥Proc of World Automation Congress (WAC),2012:13.
|
[13] |
Pradhan A.Network traffic classification using support vector machines and artificial neural networks[J].International Journal of Computer Applications 2012,8(1):812.
|
[14] |
Park B,Hong J,Won Y.Toward finegrained traffic classification[J].IEEE Communications Magazine, 2012,4(9):104111.
|
[15] |
Moore A W, Papagiannaki. Toward the accurate identification of network applications[C]∥Proc of the 6th International Workshop on Passive and Active Network Measurement,2012:4145.
|
[16] |
Karagiannis T,Broido A,Brownlee N,et al.Is P2P dying or just hiding[J].IEEE Global Telecommunications,2012,3(2):15321538.
|
[17] |
McGregor A, Hall M, Lorier P, et al. Flow clustering using machine learning techniques[C]∥Proc of the 5th International Workshop on Passive and Active Network Measurement,2004:205214.
|
[18] |
Guo Wei,Wang Xichuang,Xiao Zhenjiu.P2P traffic identification based on Kfmeans and support vector machine[J].Computer Application,2013,33(10):27342738.(in Chinese)
|
[19] |
Wu Wei,Nie Jianyun,Gao Guanglai.Improved SVM multiple clsssifiers for image annotation[J].Computer Engineering & Science,2015,37(7):13391343.(in Chinese)
|
[20] |
Xue Kai, Zhou Yajian, Ping Yuan. P2P traffic forecasting model based on wavelet transform and ESN[J].
|
|
Computer Engineering & Design,
|
20 |
13,34(4):11471152.(in Chinese)
|
|
附中文参考文献:
|
[6] |
顾彬,郑关胜,王建东.增量和减量式标准支持向量机的分析[J].软件学报,2013,24(7):16011613.
|
[18] |
郭伟,王西闯,肖振久.基于K均值和支持向量机的P2P流量识别方法[J].计算机应用,2013,33(10):27342738.
|
[19] |
吴伟,聂建云,高光来.一种基于改进的支持向量机多分类器图像标注方法[J].计算机工程与科学,2015,37(7):13391343.
|
[20] |
薛凯,周亚建,平源.基于小波变换和ESN的P2P流量预测模型[J].计算机工程与设计,2013,34(4):11471152.
|