Author:
Ren Jie,Wang Zulin,Xu Mai
Publisher
Springer International Publishing
Reference17 articles.
1. Lecture Notes in Computer Science;AW Moore,2005
2. Lecture Notes in Computer Science;H-J Kang,2003
3. Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of P2P traffic using application signatures. In: WWW, pp. 512–521. ACM (2004)
4. Wright, C.V., Monrose, F., Masson, G.M.: On inferring application protocol behaviors in encrypted network traffic. J. Mach. Learn. Res. 6, 2745–2769 (2006)
5. Williams, N., Zander, S., Armitage, G.J.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. Comput. Commun. Rev. 36(5), 5–16 (2006)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献