共 26 条
- [1] Ma L.B., Li X., Zhang L., On modeling and deploying an effective scan monitoring system, Journal of Software, 20, 4, pp. 845-857, (2009)
- [2] Talele N., Teutsch J., Erbacher R., Et al., Monitor placement for large-scale systems, The 19th ACM Symposium on Access Control Models and Technologies (SACMT'14), pp. 29-40, (2014)
- [3] Aqil A., Resource efficient frameworks for network and security problems, (2017)
- [4] Breitbart Y., Chan C.Y., Garofalakis M., Et al., Efficiently monitoring bandwidth and latency in IP networks, INFOCOM, pp. 1-10, (2001)
- [5] Hochbaum D.S., Approximation Algorithm for NP-Hard Problems, (1997)
- [6] Suh K., Guo Y., Kurose J., Et al., Locating network monitors: complexity, heuristics and coverage, Infocom 2005, pp. 351-361, (2005)
- [7] Chaudet C., Fleury E., Guerin Lassous I., Et al., Optimal positioning of active and passive monitoring devices, The CoNEXT, pp. 71-82, (2005)
- [8] Cai Z.P., Liu F., Zhao W.T., Et al., Deploying models and optimization algorithms of network measurement, Journal of Software, 19, 2, pp. 419-431, (2008)
- [9] Leskovec J., Krause A., Guestrin C., Et al., Cost-effective outbreak detection in networks, The 13th ACM SIGKDD International Conference on Knowledge Discovery and Datamining, pp. 420-429, (2007)
- [10] Krause A., McMahan B., Guestrin C., Et al., Selecting observations against adversarial objectives, International Conference on Neural Information Processing Systems, pp. 777-784, (2007)