..............page:1601-1606
..............page:1607-1612
..............page:1613-1617
..............page:1618-1623
..............page:1624-1629
..............page:1630-1637
..............page:1638-1643
..............page:1644-1651
..............page:1652-1659
..............page:1660-1666
Method of P2P Application Identification Based on Port Features
ZHOU Ya-jian;XUE Chao;PING Yuan;Information Security Center;Beijing University of Posts and Telecommunications;National Engineering Laboratory for Disaster Backup and Recovery;Beijing University of Posts and Telecommunications;Science and Technology on Electronic Control Laboratory;Department of Computer Science and Technology;Xuchang University;
..............page:1667-1672
..............page:1673-1679
..............page:1680-1687
..............page:1688-1691+1699
..............page:1692-1699
..............page:1700-1703
..............page:1704-1709
..............page:1710-1715
..............page:1716-1721
..............page:1722-1726+1733
..............page:1727-1733
..............page:1734-1739
..............page:1740-1745
..............page:1746-1751
..............page:1752-1755
..............page:1756-1760