Introduction - If you have any usage issues, please Google them yourself
With the development of Internet technology, the popularity
of the malicious threat has grown beyond our imagination.
The emergence of intelligent, sophisticated attack
techniques makes the Internet services more vulnerable
than ever, which become an important business technology
in e-commerce. Many techniques have been proposed to
detect [6, 4, 2, 3], predict [11, 14] and react [9, 15] the malicious
worm traffic, yet have limitations