Author:
Fei Xingrui,Xie Yi,Tang Shensheng,Hu Jiankun
Funder
Natural Science Foundation of China
Natural Science Foundation of Guangdong Province, China
Science and Technology Development Center of Ministry of Education of China
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference51 articles.
1. Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services;Adi;J. Netw. Comput. Appl.,2017
2. Alizadeh, H., Khoshrou, A., Zquete, A., 2015. Traffic classification and verification using unsupervised learning of Gaussian mixture models. In: 2015 IEEE International Workshop on Measurements Networking, M N, pp. 1–6.
3. An efficient algorithm for data cleaning of log file using file extensions;Anand;Int. J. Comput. Appl.,2012
4. Knowing the user’s every move: User activity tracking for website usability evaluation and implicit interaction;Atterer,2006
5. Gold mining in a river of internet content traffic;Ben Houidi,2014
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Assessment of Communication Resource Allocation by the Transmission Control Protocol for the Target Virtual Connection under Competitive Conditions;Electronics;2024-03-22
2. Formal Modeling and Analysis of User Activity Sequence in Online Social Networks: A Stochastic Petri Net-Based Approach;IEEE Transactions on Computational Social Systems;2023
3. Flow-Based User Click Identification in Encrypted Web Traffic;2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable Computing & Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous & Trusted Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta);2022-12
4. Encrypted DNS Traffic Analysis for Service Intention Inferring;IEEE Transactions on Network and Service Management;2022
5. A Mimic Cloud Ruling Method for Defending Against Time-Delayed Covert Channel Attacks;2021 International Conference on Information Science, Parallel and Distributed Systems (ISPDS);2021-08