Author:
Cherukuri Aswani Kumar,Ikram Sumaiya Thaseen,Li Gang,Liu Xiao
Publisher
Springer International Publishing
Reference86 articles.
1. Google Transparency Report. (n.d.). Retrieved April 28, 2021, from https://transparencyreport.google.com/https/overview?hl=en
2. Wang, P., Ye, F., Chen, X., & Qian, Y. (2018). Datanet: Deep learning based encrypted network traffic classification in SDN home gateway. IEEE Access, 6, 55380–55391.
3. Hu, X., Gu, C., & Wei, F. (2021). CLD-net: A network combining CNN and LSTM for internet encrypted traffic classification. Security and Communication Networks, 2021, 1–15.
4. Alshammari, R., & Zincir-Heywood, A. N. (2007). A flow based approach for SSH traffic detection. In 2007 IEEE international conference on systems, man and cybernetics (pp. 296–301). IEEE.
5. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy (pp. 305–316). IEEE.