(下转第100页)
(上接第93页)
参考文献
[1]于泽涵.移动网络中的大数据用户行为研究与分析[J].信息通信,2014,(1):224.
[2]陶彩霞,谢晓军,陈康,等.基于云计算的移动互联网大数据用户行为分析引擎设计[J].电信科学,2013,29(3):27-31.
[3]凌云,崔灿,杨俊峰.适合异构通信网络的信息传输服务[J].计算机工程,2009,35(8):152-154.
[4]Gabriel C.DoCoMo DEMANDS Google’s Help with Signaling Storm[Z].2012.
[5]向峰.基于移动网络数据的用户行为与城市感知研究[D].武汉:华中科技大学,2014.
[6]Qian Feng,Wang Zhaoguang,Gao Yudong,et al.Periodic Transfers in Mobile Applications:Network-wide Origin,Impact,and Optimization[C]//Proceedings of International Conference on World Wide Web.New York,USA:ACM Press,2012:51-60.
[7]Li Qian,Chan E W W,Lee P C,et al.Characterization of 3G Control-plane Signaling Overhead from a Data-plane Perspective[C]//Proceedings of ACM Inter-national Conference on Modeling.New York,USA:ACM Press,2012:325-332.
[8]孔祥浩.关于3G通信网络安全问题的探讨[J].电脑与电信,2010,(1):34-35.
[9]Parimala M,Lopez D,Senthilkumar N C.A Survey on Density Based Clustering Algorithms for Mining Large Spatial Databases[J].International Journal of Advanced Science and Technology,2011,31(1):59-66.
[10]Erman J,Gerber A,Hajiaghayi M T,et al.Network-aware Forward Caching[C]//Proceedings of Inter-national Conference on World Wide Web.New York,USA:ACM Press,2009:291-300.
[11]田杨,王宏,陈晓梅.采用Netflow数据的典型异常流量检测方法[J].电子科技大学学报,2009,38(S1):57-60.
[12]Racic R,Ma D,Chen Hao.Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone’s Battery[C]//Proceedings of Securecomm & Workshops.Washington D.C.,USA:IEEE Press,2006:1-10.
[13]Qian Feng,Wang Zhaoguang,Gerber A,et al.TOP:Tail Optimization Protocol for Cellular Radio Resource Alloca-tion[C]//Proceedings of ICNP’10.Washington D.C.,USA:IEEE Press,2010:285-294.
[14]Shafiq M Z,Ji Lusheng,Liu A X,et al.A First Look at Cellular Network Performance During Crowded Events[J].ACM SIGMETRICS Performance Evaluation Review,2013,41(1):17-28.
[15]Ricciato F,Hasenleithner E,Svoboda P,et al.On the Impact of Unwanted Traffic onto a 3G Network[C]//Proceedings of International Workshop on Security,Privacy and Trust in Pervasive and Ubiquitous Computing.New York,USA:ACM Press,2006:49-56.
编辑陆燕菲 |