1. Deep learning for encrypted traffic classification: An overview;Rezaei;IEEE Commun. Mag.,2019
2. A comprehensive review on encryption based open source cyber security tools;Sharma,2021
3. Anonymity communication VPN and Tor: a comparative study;Ramadhani,2018
4. {ExecScent}: Mining for new {C&C} domains in live networks with adaptive control protocol templates;Nelms,2013
5. A 60Gbps DPI prototype based on memory-centric FPGA;Su,2016