1. Identifying encrypted malware traffic with contextual flow data;Anderson,2016
2. Machine learning for encrypted malware traffic classification: Accounting for noisy labels and non-stationarity;Anderson,2017
3. Deciphering malware’s use of TLS (without decryption);Anderson,2016
4. Computer viruses and malware;Aycock,2006
5. Snort and SSL/TLS inspection;Bakhdlaghi,2017