[1] |
WANG F , HUANG Z T , ZHOU Y . A new method for m-sequence and gold-sequence generator polynomial estimation[C]//International Symposium on Microwave,Antenna,Propagation and Emc Technolo-gies for Wireless Communications. 2007:1039-1044.
|
[2] |
杨忠立, 刘玉君 . 自同步扰乱序列的综合算法研究[J]. 信息技术, 2005(2): 30-32. YANG Z L , LIU Y J . Algorithm research of self-synchronizing scrambler sequence[J]. Information Technology, 2005(2): 30-32.
|
[3] |
廖红舒, 袁叶, 甘露 . 自同步扰码的盲识别方法[J]. 通信学报, 2013(1): 136-143. LIAO H S , YUAN Y , GAN L . Novel blinal recognition method for self-synchronized scrambler[J]. Journal on Communications, 2013(1): 136-143.
|
[4] |
杨学军, 苏金树 . 关于我国网络电磁空间安全战略的思考[J]. 国防科技, 2010,31(4): 1-3. YANG X J , SU J S . Security strategy of network and electromagnet-ism in China:perspectives and suggestions[J]. National Defense Sci-ence and Technology, 2010,31(4): 1-3.
|
[5] |
SDONG G , JIAN P . Sequence data mining[J]. Advances in Database Systems, 2007,33(2):800.
|
[6] |
肖国震 . 伪随机序列及其应用[M]. 北京: 国防工业出版社, 1985. XIAO G Z . Pseudo random sequence and its applications[M]. Beijing: National Defence Industry Press, 1985.
|
[7] |
SCHNEIER B . Secrets and lies:digital security in a networked world[J]. Info, 2003,5(1): 163-165.
|
[8] |
翁贻方, 郑德玲, 王云雄 . 基于混沌序列密码的网络信息加密系统[J]. 微计算机信息, 2007,23(30): 94-95. WENG Y F , ZHENG D L , WANG Y X . Research and implementation of the chaotic stream cipher-based network information cryptography system[J]. Microcomputer Information, 2007,23(30): 94-95.
|
[9] |
SPRING M , WESTERMEYER J , HALCON L , et al. Technique for processing encoded information in a wireless communication ner-work[J]. Journal of Nervous & Mental Disease, 2015,191(12): 813-819.
|
[10] |
MCELIECE R J . he theory of information and coding[J]. Mathe-matical Gazette, 2002.
|
[11] |
张进, 黄清杉, 赵文栋 , 等. 面向骨干网流量分析与管理的计数器结构[J]. 软件学报, 2013,24(9): 2165-2181. ZHANG J , HUANG Q S , ZHAO W D , et al. Statistics counter archi-tecture for backbone network traffic analysis and management[J]. Journal of Software, 2013,24(9): 2165-2181.
|
[12] |
蒋建春, 马恒太 . 网络安全入侵检测:研究综述[J]. 软件学报, 2000,11(11): 1460-1466. JIANG J C , MA H T . A survey of intrusion detection research on network security[J]. Journal of Software, 2000,11(11): 1460-1466.
|
[13] |
BERNDT D J , CLIFFORD J . Using dynamic time warping to find patterns in time series[C]// Working Notes of the Knowledge Discov-ery in Databases Workshop. 1994:359-370.
|
[14] |
KEOGH E , LIN J , FU A . HOT SAX:efficiently finding the most unusual time series subsequence[C]//5th IEEE International Confer-ence on Data Mining. 2005.
|
[15] |
KEOGH E , CHAKRABARTI K , PAZZANI M , et al. Dimensionality reduction for fast similarity search in large time series databases[J]. Knowledge & Information Systems, 2001,3(3): 263-286.
|
[16] |
PERNG C S , WANG H , ZHANG S R , et al. Landmarks:a new model for similarity-based pattern querying in time series databases[J]. Icde, 2000,93(7): 33-42.
|
[17] |
董晓莉, 顾成奎, 王正欧 . 基于形态的时间序列相似性度量研究[J]. 电子与信息学报, 2007,29(5):1228-1231. DONG X L , GU C K , WANG Z O . Research on shape-based time se-ries similarity measure[J]. Journal of Electoral of Electronics Informa-tion Technology, 2007,29(5):1228-1231.
|
[18] |
RUKHIN A , SOTO J , NECHVATAL J . A statistical test suite for random and pseudorandom number generators for cryptographic applications[S]. NIST Special Publication 800-22, 2013.
|
[19] |
SCHNEIER B P . Applied cryptography:protocols,algorithms,and source code in C[J]. Government Information Quarterly, 1994,13(3):336.
|
[20] |
王新梅, 肖国镇 . 纠错码原理与方法[M]. 西安: 西安电子科技大学出版社, 1996. WANG X M , XIAO G Z . Theory and method of error-correcting codes[M]. Xi'an: Xidian University Press, 1996.
|
[21] |
盛骤 . 概率论与数理统计(第四版)[M]. 北京: 高等教育出版社, 2008. SHENG Z . Probability and mathematical statistics (4thed)[M]. Beijing: Higher Education Press, 2008.
|
[22] |
RUKHIN A , SOTO J , NECHVATAL J , et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications[J]. Research Gate, 2010.
|