Author:
Zhou Zhihong,Bin Hu,Li Jianhua,Yin Ying,Chen Xiuzhen,Ma Jin,Yao Lihong
Funder
National Key Research and Development Program of China
Shanghai industrial foundation project
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference26 articles.
1. Cisco: Annual Cybersecurity Report: The evolution of malware and rise of artificial intelligence[R/OL]. (2018-02) [2019-07-22] (2018). https://www.cisco.com/c/en/us/products/security/security-reports.html
2. Korczynski, M., Duda, A.: Markov chain fingerprinting to classify encrypted traffic. In: INFOCOM, 2014 Proceedings IEEE, pp. 781–789. IEEE (2014)
3. Zhao, B., Guo, H., Liu, Q.R., et al.: Protocol independent identification of encrypted traffic based on weighted eumnlative sum test. J. Softw. 24(6), 1334–1345 (2013)
4. Velan, P., Cermak, M., Celeda, P., et al.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5), 355–374 (2015)
5. Khakpour, A.R., Liu, A.X.: An information-theoretical approach to high-speed flow nature identification. IEEE/ACM Trans. Netw. (TON) 21(4), 1076–1089 (2013)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献