[1] |
MAIER G , FELDMANN A , PAXSON V , et al. On dominant charac-teristics of residential broadband Internet traffic[C]// 9th ACM SIG-COMM Conference on Internet Measurement. ACM, 2009:90-102.
|
[2] |
GEHLEN V , FINAMORE A , MELLIA M , et al. Uncovering the big players of the Web[M]. Springer Berlin Heidelberg, 2012.
|
[3] |
MOBILE TRENDS A . Global mobile broadband traffic report[R/OL]. Allot Communications, Technical Report, , 2010.
|
[4] |
BERGHEL H . The discipline of Internet forensics[J]. Communications of the ACM, 2003,46(8):15-20.
|
[5] |
WATTS S , NEWBY J M , MEWTON L , et al. A clinical audit of changes in suicide ideas with internet treatment for depression[J]. BMJ open, 2012,2(5):e001558.
|
[6] |
PANAH A , PANAH A , PANAH O , et al. Challenges of security issues in cloud computing layers[J]. Rep Opin, 2012,4(10):25-29.
|
[7] |
GOKCEN Y , FOROUSHANI V A , HEYWOOD A . Can we identify NAT behavior by analyzing traffic flows[C]// IEEE Security and Pri-vacy Workshops (SPW). 2014:132-139.
|
[8] |
LIU T T , YANG W , XU C L , et al. A SNR-based multi-channel multi-cast scheme for popular video in wireless networks[J]. Journal of Networks, 2013,8(3):628-635.
|
[9] |
HAYTON S J , JONES D R , LOBO A R , et al. Using entity tags (etags) in a hierarchical HTTP proxy cache to reduce network traffic: U.S. Patent Application 13/360,891[P]. 2012-1-30.
|
[10] |
LEE S , KIM J . Warningbird: a near real-time detection system for suspicious URLs in twitter stream[J]. IEEE Transactions on Depend-able and Secure Computing, 2013(3):183-195.
|
[11] |
JENEFA A , RAVI R . Classifier: a real-time detection system for suspi-cious URLs in Twitter stream[J]. International Journal, 2014,2(2).
|
[12] |
ZHANG J , SEIFERT C , STOKES J W , et al. Arrow: generating signa-tures to detect drive-by downloads[C]// 20th International Conference on World Wide Web. ACM, 2011:187-196.
|
[13] |
GOLDBERG J , WESTERLUND M , ZENG T . A network address translator (NAT) traversal mechanism for media controlled by real-time streaming protocol (RTSP)[J/OL]. .
|
[14] |
MAIER G , SCHNEIDER F , FELDMANN A . NAT usage in residential broadband networks[M]. Passive and Active Measurement. Springer Berlin Heidelberg, 2011.
|
[15] |
NEASBITT C , PERDISCI R , LI K , et al. Clickminer: towards forensic reconstruction of user-browser interactions from network traces[C]// The 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014:1244-1255.
|
[16] |
JINYUAN C . The application of load runner in software performance test[J]. Computer Development & Applications, 2012,5:014.
|