• Chinese Journal of Quantum Electronics
  • Vol. 32, Issue 5, 587 (2015)
Xinliang WANG*, Xiang JIN, and Qianhui YANG
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461.2015.05.012 Cite this Article
    WANG Xinliang, JIN Xiang, YANG Qianhui. Chord-based quantum botnet research[J]. Chinese Journal of Quantum Electronics, 2015, 32(5): 587 Copy Citation Text show less
    References

    [2] Ying Lingyun, Feng Dengguo, Su Purui. P2P-based super botnet: Threats and defenses[J]. Acta Electronica Sinica, 2009, 37(1): 31-37.

    [3] Francois J, State R, Festor O. Towards malware inspired management frameworks[C]. IEEE/IFIP Network Operations and Management Symposium[M]. 2008: 105-112.

    [4] Chen Luying, Wang Xinliang, Zhao Xin, et al. Research of botnet anomaly detection algorithm based on private protocol[C]. Proceedings of 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology[M]. 2010: 55-59.

    [5] Wang Xinliang, Lu Nan, Wang Cuicui. Research of botnet detection based on multi-stage classifier[C]. Proceedings of the 2011 International Conference on Electrical, Information Engineering and Mechatronics[M]. 2011: 1463-1472.

    [6] Lu Nan, Wang Xinliang, Liu Fang, et al. Research of the combined botnet detection method based on random subspace[C]. 4th IEEE International Conference on Broadband Network and Multimedia Technology[M]. 2011: 615-619.

    [7] Ma Xiaobo, Guan Xiaohong, Tao Jing, et al. A novel IRC botnet detection method based on packet size sequence[C]. IEEE International Conference on Communications[M]. 2010: 1-5.

    [8] Bartlett G, Heidemann J, Papadopoulos C. Low-rate, flow-level periodicity detection[C]. IEEE Conference on Computer Communications Workshops[M]. 2011: 804-809.

    [9] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing[M]. 1984: 175-179.

    [10] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 3121-3124.

    [11] Fujiwara Mikio, Yoshino Ken-Ichiro, Nambu Yoshihiro, et al. Modified E91 protocol demonstration with hybrid entanglement photon source[J]. Opt. Expr., 2014, 22(11): 13616-13624.

    [12] Tang Yanlin, Yin Hualei, et al. Measurement-device-independent quantum key distribution over 200 km[J]. Phys. Rev. Lett., 2014, 113(19): 190501.

    [18] El-Ansarys, Alima L O, Brand P, et al. Efficient broadcast in structured P2P network[C]. nd International Workshop on Peer-to-Peer Systems, 2003.

    WANG Xinliang, JIN Xiang, YANG Qianhui. Chord-based quantum botnet research[J]. Chinese Journal of Quantum Electronics, 2015, 32(5): 587
    Download Citation