Author:
Lu Anting,Wu Hua,Luo Hao,Cheng Guang,Hu Xiaoyan
Publisher
Springer Nature Switzerland
Reference18 articles.
1. Afuwape, A.A., Xu, Y., Anajemba, J.H., Srivastava, G.: Performance evaluation of secured network traffic classification using a machine learning approach. Comput. Stand. Interfaces 78, 103545 (2021)
2. Akhshabi, S., Anantakrishnan, L., Begen, A.C., Dovrolis, C.: What happens when http adaptive streaming players compete for bandwidth? In: Proceedings of the 22nd International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 9–14 (2012)
3. Barradas, D., Santos, N., Rodrigues, L.: Effective detection of multimedia protocol tunneling using machine learning. In: 27th $$\{$$USENIX$$\}$$ Security Symposium ($$\{$$USENIX$$\}$$ Security 18), pp. 169–185 (2018)
4. Chen, S., Wang, R., Wang, X., Zhang, K.: Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy, pp. 191–206. IEEE (2010)
5. Cho, K.: Km, and kato, a. traffic data repository at the wide project. USENIX ATC, Freenix track (2000)