[1] |
TIAN Zhongda, PAN Xinpeng.
Network Traffic Prediction Using Wavelet Denoising and Optimized Support Vector Machine
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(5): 79-84.
|
[2] |
GUO Shize, Lü Renjian, HE Mingshu, ZHANG Jie, YU Saisai.
Application of Flow Spectrum Theory in Network Defense
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 19-25.
|
[3] |
MU Xiao-hui, LI Li-xiang.
Network Traffic Prediction of Dropout Echo State Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5): 10-13,20.
|
[4] |
LI Shi-ning, FAN Xiang-hui, LIU Zhou-zhou, CHEN Chang-sheng, CHENG Tao.
Status and Analysis of Wireless Avionics Intra-Communications Network Protocol
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(3): 1-8.
|
[5] |
WANG Xiao-nan, FU Jin-xuan, YU Hong-fang, SUN Gang, CHEN Hai-bing.
Network Protocol Security Analysis Based on Abstract Principle and Model Detection
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 40-46.
|
[6] |
XING Chang-you, LI Dong-yang, XIE Sheng-xu, ZHANG Guo-min, WEI Wei.
A Heavy Hitter Detection Mechanism in Software Defined Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 97-103.
|
[7] |
ZHAO Ji-hong, WANG Ming-xin, QU Hua, XIE Zhi-yong, LIU Xi.
An Adaptive KLMS Traffic Prediction Algorithm for Satellite Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(3): 51-55.
|
[8] |
WU Hao, LI Yang, ZHANG Chu-wen, LIU Bin.
The Hardware Measurement System for High-Speed Network Flow
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 24-28.
|
[9] |
TIAN Zhong-da, LI Shu-jiang, WANG Yan-hong, WANG Xiang-dong.
Network Traffic Prediction Based on ARIMA with Gaussian Process Regression Compensation
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(6): 65-73.
|
[10] |
ZHANG Chun-hong, HU Qing-yuan, CHENG Shi-duan.
A Distributed Semantic Resources Search Based on Dimensionality Reduction Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(2): 74-78.
|
[11] |
.
Study on the SelfSimilarity of P2P Traffic Behavior Based on Fractal Method
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(4): 35-38.
|
[12] |
LU Feng;ZHENG Kang-feng;NIU Xin-xin;YANG Yi-xian.
Construct a Risk-Aware Peer-to-Peer Security Trust Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 33-37.
|
[13] |
SUN Han-lin1;JIN Yue-hui1;CUI Yi-dong1,2;CHENG Shi-duan1.
Large-Time Scale Network Traffic Short-Term Prediction by Grey Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 7-11.
|
[14] |
.
A Network Traffic MonitorNode SelectionAlgorithm Based on Triple Tag
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 73-76.
|
[15] |
XU Xin,HE Jing sha,SHI Heng hua.
Inference of Network Bottleneck Link Based on End-to-End Loss Measurements
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 93-96.
|