Publisher
Springer International Publishing
Reference18 articles.
1. Xia, N., et al.: Mosaic: quantifying privacy leakage in mobile networks. ACM SIGCOMM Comput. Commun. Rev. 43(4), 279–290 (2013)
2. Lecture Notes in Computer Science;T Karagiannis,2007
3. Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel bloom filters. In: High Performance Interconnects 2003, vol. 20, pp. 44–51. IEEE, New York (2003)
4. Shen, M., Wei, M., Zhu, L., Wang, M.: Classification of encrypted traffic with second-order Markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8), 1830–1843 (2017)
5. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303–336 (2014)