Author:
Niu Zequn,Xue Jingfeng,Qu Dacheng,Wang Yong,Zheng Jun,Zhu Hongfei
Funder
National Natural Science Foundation of China
Natural Science Foundation of Chongqing
Chongqing Municipal Education Commission
National Key Research and Development Program of China
Major Scientific and Technological Innovation Project of Shandong Province
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference34 articles.
1. S. Sen, O. Spatscheck, and D. Wang, Accurate, scalable in-network identification of p2p traffic using application signatures, in Proceedings of the 13th conference on World Wide Web - WWW ’04, New York, NY, USA, 2004, pp. 512–521. https://doi: 10.1145/988672.988742.
2. A group key agreement protocol for intelligent internet of things system;Zhang;International Journal of Intelligent Systems.,2021
3. F. Callegati, W. Cerroni, and M. Ramilli, Man-in-the-Middle Attack to the HTTPS Protocol, IEEE Security & Privacy Magazine, vol. 7, no. 1, pp. 78–81, Jan. 2009, https://doi: 10.1109/MSP.2009.12.
4. D. McGrew and B. Anderson, Enhanced telemetry for encrypted threat analytics, in 2016 IEEE 24th International Conference on Network Protocols (ICNP), Singapore, Nov. 2016, pp. 1–6. doi: 10.1109/ICNP.2016.7785325.
5. Hunting Malicious TLS Certificates with Deep Neural Networks;Torroledo,2018
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献