1. Deciphering malware's use of TLS (without decryption);Anderson;J. Comput. Virol. Hacking Tech.,2018
2. Identifying encrypted malware traffic with contextual flow data;Anderson,2016
3. Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity;Anderson,2017
4. Machine learning-powered encrypted network traffic analysis: a comprehensive survey;Shen;IEEE Commun. Surv. Tutor.,2022
5. Large-scale heterogeneous feature embedding;Huang;Proc. AAAI Conf. Artif. Intell.,2019