Clustering perception mining of network protocol’s stealth attack behavior
Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining al...
Saved in:
| Main Authors: | Yan-jing HU, Qing-qi PEI |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2017-06-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017123/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Stealth Democracy: Authoritarianism and Democratic Deliberation
by: Peter Muhlberger
Published: (2018-12-01) -
Stealth-Maneuver Generation for Non-Stealth Aircraft: A Control Barrier Function Approach
by: Mustafa Demir, et al.
Published: (2025-05-01) -
Survey on Low Energy Adaptive Clustering Hierarchical Protocol
by: Khatereh Bagherzadeh Asl, et al.
Published: (2022-09-01) -
High-Temperature Stealth Across Multi-Infrared and Microwave Bands with Efficient Radiative Thermal Management
by: Meng Zhao, et al.
Published: (2025-03-01) -
A hyperspectral stealth material design method based on the composition and mixing spectral feature of desert soil
by: Xiaodong Ma, et al.
Published: (2025-01-01)