求助PDF
{"title":"基于最大频繁顺序模式挖掘的App-DDoS攻击检测:基于最大频繁顺序模式挖掘的App-DDoS攻击检测","authors":"Jin-ling Li, Binqiang Wang","doi":"10.3724/SP.J.1146.2012.01372","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":51678,"journal":{"name":"电子与信息学报","volume":"5 1","pages":"1739-1745"},"PeriodicalIF":0.5000,"publicationDate":"2014-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Detecting App-DDoS Attacks Based on Maximal Frequent Sequential Pattern Mining: Detecting App-DDoS Attacks Based on Maximal Frequent Sequential Pattern Mining\",\"authors\":\"Jin-ling Li, Binqiang Wang\",\"doi\":\"10.3724/SP.J.1146.2012.01372\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":51678,\"journal\":{\"name\":\"电子与信息学报\",\"volume\":\"5 1\",\"pages\":\"1739-1745\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2014-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"电子与信息学报\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.3724/SP.J.1146.2012.01372\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"电子与信息学报","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.3724/SP.J.1146.2012.01372","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 2
引用
批量引用