[1] |
ZAND A , VIGNA G , YAN X ,et al. Extracting probable command and control signatures for detecting botnets[C]// The 29th Annual ACM Symposium on Applied Computing. ACM, 2014: 1657-1662.
|
[2] |
AFEK Y , BREMLER-BARR A , FEIBISH S L . Zero-day signature extraction for high-volume attacks[J]. IEEE/ACM Transactions on Networking, 2019,27(2): 691-706.
|
[3] |
BILGE L , BALZAROTTI D , ROBERTSON W ,et al. Disclosure:detecting botnet command and control servers through large-scale netflow analysis[C]// The 28th Annual Computer Security Applications Conference. ACM, 2012: 129-138.
|
[4] |
VORMAYR G , ZSEBY T , FABINI J . Botnet communication patterns[J]. IEEE Communications Surveys and Tutorials, 2017,19(4): 2768-2796.
|
[5] |
PISKOZUB M , SPOLAOR R , MARTINOVIC I . MalAlert:detecting malware in large-scale network traffic using statistical features[J]. ACM SIGMETRICS Performance Evaluation Review, 2019,46(3): 151-154.
|
[6] |
ASSAF M , NAUMANN D A , SIGNOLES J ,et al. Hypercollecting semantics and its application to static analysis of information flow[J]. ACM SIGPLAN Notices, 2017,52(1): 874-887.
|
[7] |
FEI H , JIANG R , YANG Y ,et al. Content based social behavior prediction:a multi-task learning approach[C]// The 20th ACM international conference on Information and knowledge management. ACM, 2011: 995-1000.
|
[8] |
ZHU J , XIONG F , PIAO D ,et al. Statistically modeling the effectiveness of disaster information in social media[C]// Global Humanitarian Technology Conference. IEEE, 2011: 431-436.
|
[9] |
KUO T T , HUNG S C , LIN W S ,et al. Exploiting latent information to predict diffusions of novel topics on social networks[C]// The 50th Annual Meeting of the Association for Computational Linguistics:Short Papers-Volume 2. Association for Computational Linguistics, 2012: 344-348.
|
[10] |
GOYAL A , BONCHI F , LAKSHMANAN L V S . Learning influence probabilities in social networks[C]// Proceedings of the Third ACM International Conference on Web Search and Data Mining. ACM, 2010: 241-250.
|
[11] |
DEY K , LAMBA H , NAGAR S ,et al. Modeling topical information diffusion over microblog networks[C]// International Conference on Complex Networks and their Applications. Springer, 2018: 353-364.
|
[12] |
LU Y , YU L , ZHANG T ,et al. Collective human behavior in cascading system:discovery,modeling and applications[C]// 2018 IEEE International Conference on Data Mining. IEEE, 2018: 297-306.
|
[13] |
茆诗松, 程依明, 濮晓龙 ,等. 概率论与数理统计教程:第2版[M]. 北京: 高等教育出版社, 2011.
|
|
MAO S S , CHENG Y M , PU X L ,et al. Probability and statistics:2nd ed[M]. Beijing: Higher Education PressPress, 2011.
|
[14] |
方兆本, 缪柏其 . 随机过程[M]. 合肥: 中国科学技术大学出版社, 1993.
|
|
FANG Z B , MIU B Q . Stochastic process[M]. Hefei: University of Science and Technology of China PressPress, 1993.
|
[15] |
CLAUSET A , SHALIZI C R , NEWMAN M E J . Power-law distributions in empirical data[J]. SIAM Review, 2009,51(4): 661-703.
|
[16] |
MITZENMACHER M . A brief history of generative models for power law and lognormal distributions[J]. Internet mathematics, 2004,1(2): 226-251.
|
[17] |
LESKOVEC J , LANG K J , DASGUPTA A ,et al. Statistical properties of community structure in large social and information networks[C]// Proceedings of the 17th International Conference on World Wide Web. ACM, 2008: 695-704.
|
[18] |
LESKOVEC J , FALOUTSOS C . Scalable modeling of real graphs using kronecker multiplication[C]// Proceedings of the 24th International Conference on Machine Learning. ACM, 2007: 497-504.
|
[19] |
ERD?S P,RéNYI A , . On the evolution of random graphs[M]// The Structure and Dynamics of Networks. Princeton University Press, 2011: 38-82.
|
[20] |
CLAUSET A , MOORE C , NEWMAN M E J . Hierarchical structure and the prediction of missing links in networks[J]. Nature, 2008,453(7191): 98-101.
|
[21] |
GROVER A , ZWEIG A , ERMON S . Graphite:iterative generative modeling of graphs[J]. arXiv Preprint,arXiv:1803.10459, 2018.
|
[22] |
AGARWAL A , XIE B , VOVSHA I ,et al. Sentiment analysis of twitter data[C]// Proceedings of the workshop on languages in social media. Association for Computational Linguistics, 2011: 30-38.
|
[23] |
SHETTY J , ADIBI J . The Enron email dataset database schema and brief statistical report[R]. Information Sciences Institute Technical Report,University of Southern California, 2004: 120-128.
|