1. A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception;Abolfathi,2022
2. Classifying SSH encrypted traffic with minimum packet header features using genetic programming;Alshammari,2009
3. A flow based approach for SSH traffic detection;Alshammari,2007
4. A comparison of three machine learning techniques for encrypted network traffic analysis;Arndt,2011
5. Your WiFi is leaking: inferring user behaviour, encryption irrelevant;Atkinson,2013