相似文献/References:
[1]刘旭勇.DDoS攻击及主动防御模型研究[J].计算机技术与发展,2008,(07):143.
LIU Xu-yong.Research on DDoS Attacks and Proactive Defense Model[J].,2008,(12):143.
[2]郭晓军,何磊,赵江波.僵尸网络流量检测与控制追踪技术研究[J].计算机技术与发展,2013,(09):135.
GUO Xiao-jun,HE Lei,ZHAO Jiang-bo.Research on Botnet Traffic Detection with Control and Tracking[J].,2013,(12):135.
[3]李雪妍,陈 伟,杜俊雄.物联网僵尸网络的恶意域名检测技术研究[J].计算机技术与发展,2019,29(08):113.[doi:10. 3969 / j. issn. 1673-629X. 2019. 08. 022]
LI Xue-yan,CHEN Wei,DU Jun-xiong.Research on Malicious Domain Name Detection Technology in IoT Botnet[J].,2019,29(12):113.[doi:10. 3969 / j. issn. 1673-629X. 2019. 08. 022]
[4]何娅蓥,覃仁超,舒 月,等.BRNet:基于特征复用的僵尸网络检测模型[J].计算机技术与发展,2023,33(04):108.[doi:10. 3969 / j. issn. 1673-629X. 2023. 04. 016]
HE Ya-ying,QIN Ren-chao,SHU Yue,et al.BRNet:Botnet Detection Model Based on Feature Reuse[J].,2023,33(12):108.[doi:10. 3969 / j. issn. 1673-629X. 2023. 04. 016]