吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (2): 459-464.doi: 10.13229/j.cnki.jdxbgxb201402029
• paper • Previous Articles Next Articles
XIA Jing-bo, BAI Jun, ZHAO Xiao-huan, WU Ji-xiang
CLC Number:
[1] Internet Assigned Numbers Authority (IANA)[EB/OL].[2010-08-28]. http://www.iana.org/assignments/port-numbers[2] Moore A W, Papagiannaki D. Toward the accurate Identification of network applications[C]//Poc 6th Passive Active Measurement. Workshop (PAM), Boston, MA, USA, 2005.[3] Sen S, Spatscheck O, Wand D. Accurate, scalable in-network identification of P2P traffic using application signatures[C]//Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers & Posters (WWW'04). New York, USA: ACM, 2004.[4] Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: multilevel traffic classification in the dark[C]//ACM SIGCOMM. Phila-delphia, PA, USA, 2005.[5] Dainotti A, Pescape A, Sansone C. Issues and future directions in traffic classification[J]. IEEE Network, 2012, 26(1):35-40.[6] Gu Cheng-jie, Zhang Shun-yi, Sun Yan-fei. Real-time encrypted traffic identification using machine learning[J].Journal of Software, 2011, 6(6):1009-1016.[7] 孙知信, 张玉峰. 基于多维支持向量机的P2P网络流量识别模型[J]. 吉林大学学报:工学版, 2010, 40(5): 1298-1302. Sun Zhi-xin, Zhang Yu-feng. P2P network traffic identification model based on MSVM[J]. Journal of Jilin University (Engineering and Technology Edition), 2010, 40(5): 1298-1302.[8] Tipping M. Sparse Bayesian learning and the relevance vector machine[J]. Journal of Machine Learning Research, 2001, 1(1): 211-244.[9] 杨成福, 章毅. 相关向量机及在说话人识别应用中的研究[J]. 电子科技大学学报, 2010, 39(2):311-315. Yang Cheng-fu, Zhang Yi. Study to speaker recognition using RVM[J]. Journal of Electronic Science and Technology, 2010, 39(2):311-315.[10] Mianji F A, Zhang Y. Robust hyperspectral classification using relevance vector machine[J]. Geoscience and Remote Sensing, 2011, 49(6):2100-2112.[11] Moore A W, Zuev D. Internet traffic classification using Bayesian analysis techniques[C]//Proc of the 2005 ACM SIGMETRICS Int'l Conf. on Measurement and Modeling of Computer Systems, Banff, 2005.[12] Moore A W, Zuev D. Discriminators for use in flow-based classification[R]. Technical Report, Intel Research, Cambridge, 2005.[13] NetMate[EB/OL].[2012-07-03].http:[C]//sourceforge.net/projects/netmate-meter/.[14] Bernaille L, Teixeira R, Akodkenou I, et al.Traffic classification on the fly[J].ACM SIGCOMM Computer Communication Review, 2006, 36(2):23-26. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|