Funder
Purple Mountain Laboratories
National Natural Science Foundation of China
Reference47 articles.
1. Classification of encrypted traffic with second-order Markov chains and application attribute bigrams;Shen;IEEE Trans. Inf. Forensics Secur.,2017
2. M. Korczyński, A. Duda, Markov chain fingerprinting to classify encrypted traffic, in: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, 2014, pp. 781–789.
3. T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D.J. Dubois, M. Lindorfer, D.R. Choffnes, M. van Steen, A. Peter, FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic, in: Proceedings 2020 Network and Distributed System Security Symposium, 2020.
4. HTTP over TLS;Rescorla;RFC,2000
5. sslpulse, URL https://www.ssllabs.com/ssl-pulse/. Accessed 11 December 2023.