[1] 陈亮, 龚俭, 徐选. 基于特征串的应用层协议识别[J]. 计算机工程与应用, 2006, 24: 16-19. Chen Liang, Gong Jian, Xu Xuan. Identification of application-level protocols using characteristics[J]. Journal of Computer Engineering and Application, 2006, 24: 16-19. [2] 陈曙晖, 苏金树. 基于内容分析的协议识别研究[J]. 国防科技大学学报, 2008, 30(4): 82-87. Chen Shuhui, Su Jinshu. Identification research based on content analysis[J]. Journal of National University of Defence Technology, 2008, 30(4): 82-87. [3] 邹艳, 陆佩忠. 关键方程的新推广[J]. 计算机学报, 2006, 29(5): 712- 718. Zou Yan, Lu Peizhong. A new generalization of key equation[J]. Chinese Journal of Computers, 2006, 29(5): 712-718. [4] Wang Fenghua, Huang Zhitao. A method for blind recognition of convolution code based on euclidean algorithm//WCNMC 2007. Shanghai: IEEE Press, 2007: 1414-1417. [5] 刘健, 王晓君, 周希元. 基于Walsh- Hadamard 变换的卷积码盲识别[J]. 电子与信息学报, 2010, 32(4): 884-888. Liu Jian, Wang Xiaojun, Zhou Xiyuan. Blind recognition of convolutional coding based on Walsh-Hadamard transform[J]. Journal of Electronics & Information Technology, 2010, 32(4): 884-888. [6] 周亚建, 刘健. (n, n-1, m)卷积码的盲识别[J]. 北京邮电大学学报, 2010, 33(3): 135-138. Zhou Yajian, Liu jian. A blind recognition of the (n, n-1, m) convolution code[J]. Journal of Beijing University Posts and Telecommunications, 2010, 33(3): 135-138. [7] 刘玉君. 信道编码[M]. 郑州: 河南科学技术出版社, 2007: 129-180. [8] 张永光, 楼才义. 信道编码及其识别分析[M]. 北京: 电子工业出版社, 2010: 41-43. |