Author:
Lapczyk Lukasz,Skillicorn David
Publisher
Springer Nature Switzerland
Reference34 articles.
1. Alan, H.F., Kaur, J.: Can android applications be identified using only TCP/IP headers of their launch time traffic? In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 61–66. ACM (2016)
2. Alshammari, R., Zincir-Heywood, A.N.: Machine learning based encrypted traffic classification: identifying SSH and Skype. In: Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, pp. 1–8. IEEE (2009)
3. Berwick, R.: An idiot’s guide to support vector machines (SVMs) (2003). http://svms.org/tutorials/Berwick2003.pdf. Accessed 02 Nov 2019
4. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
5. Communications in Computer and Information Science;Z Cao,2014