1WILLINGER W. A bibliographical guide to self-similar traffic and performance modeling for modern high-speed networks[A]. Stochastic Networks :Theory and Applications[C]. 1996. 339-366.
3FOX K, HENNING R, REED J, SIMONIAN R. A Neural Network Approach Towards Intrusion Detection[R]. Harris Corporation, 1990.
4YE N. A markov chain model of temporal behavior for anomaly detection[A]. Workshop on Information Assurance and Security[C]. West Point,NY, 2000.
5KAIZAKIR. Aguri: an aggregation-based traffic profiler[EB/OL]. http://www.csl.sony.co.jp/person/kjc/kjc/software.html.
6Katabi D.,Handley M.,Rohrs C..Internet congestion control for high bandwidth-delay product networks.In:Proceed ings of the ACM SIGCOMM 2002,Pittsburgh,2002
7Dukkipati N.,Kobayashi M.,Shen R.Z.,McKeown N..Minimizing the duration of flows.Department of Computer Science and Electrical Engineering,Stanford University,Stanford:Technical Report TR04-HPNG-061604,2005
8Kelly F.P.,Maulloo A.K.,Tan D.K.H..Rate control for communication networks:Shadow prices,proportional fairness and stability.Journal of the Operational Research Society,1998,49(3):237~252
9Johari R.,Tan D.K.H..End-to-end congestion control for the Internet:Delays and stability.IEEE/ACM Transactions on Networking,2000,9(6):818~832
10Vinnicombe G..On the stability of end-to-end congestion control for the Internet.Department of Engineering,University of Cambridge,Cambridge:Technical Report CUED/F-INFENG/TR.398,2000