[1] M Mathis, J Semske, J Mahdavi, et al. The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm[J]. Computer Communication Review (S0146-4833), 1997, 27(3): 67-82. [2] J Padhye, V Firoiu, D Towsley, et al. Modeling TCP Throughput: A Simple Model and its Empirical Validation[J]. Proceedings of SIGCOMM’ 98 (S0146-4833), 1998, 28(4): 303-314. [3] Wllliam D, Toshinori M.Principles and applications of chaotic systems[J]. Communications of the ACM (S0001-0782), 1995, 38(11): 96-102. [4] Liu F, Guan ZH, Wang HO.Stability and Hopf bifurcation analysis in a TCP fluid model[J]. Nonlinear Analysis-Real World Applications (S1468-1218), 2011, 12(1): 353-363. [5] Zhao H, Shi Y Q.Detecting Covert Channels in Computer Networks Based on Chaos Theory[J]. IEEE Transactions on Information Forensics and Security (S1556-6013), 2013, 8(2): 273-282. [6] Wang J S, Yuan R X, Gao Z W, et al. Hopf bifurcation and uncontrolled stochastic traffic-induced chaos in an RED-AQM congestion control system[J]. Chinese Physics B (S1674-1056), 2011, 20(9): 353-363. [7] Veres A, Boda M.The chaotic nature of TCP congestion control[C]// Proceedings of IEEE INFOCOM. TelAviv, Israel: IEEE Computer Society, 2000: 1715-1723. [8] 姜文刚, 孙金生, 王执铨. TCP拥塞控制中的死锁与混沌[J]. 南京理工大学学报, 2011, 35(4): 453-457. [9] Komatsubara Shigeyuki, Suzuki Ryoichi, Mogi Kazuo, et al. Internet traffic analysis based on chaos attractors[J]. NTT R & D (S0915-2326), 1998, 47(3): 341-346. [10] Cristina Morel, Marc Bourcerie, Francois Chapeau- Blondeau.Generating independent chaotic attractors by chaos anticontrol in nonlinear circuits[J]. Chaos, Solitons and Fractals (S0960-0779), 2005, 26(2): 541-549. [11] N H Packard, J P Crutchfield, J D Farmer, et al. Geometry from a Time Series[J]. Phys. Rev. Lett.(S0031-9007), 1980, 45(9): 712-716. [12] Sheikholeslam Arash.A chaos based encryption method using dynamical systems with strange attractors (C). [C]// ICETE 2009 International Joint Conference on e-Business and Telecommunication. Milan, Italy: INSTICC Press, 2009: 259-265. |