1. Network traffic identification of several open source secure proxy protocols
2. Huang Y , Lin Y. Transnational cybercrime is getting worse and stronger, China and ASEAN seek to join hands . 2015 . http://www.12377.cn/txt/2015-09/15/content_8235494. Huang Y, Lin Y. Transnational cybercrime is getting worse and stronger, China and ASEAN seek to join hands. 2015. http://www.12377.cn/txt/2015-09/15/content_8235494.
3. Miller S , Curran K , Lunney T. Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]//2018 International Conference On Cyber Situational Awareness , Data Analytics And Assessment (Cyber SA) . IEEE , 2018 : 1-8. Miller S, Curran K, Lunney T. Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]//2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2018: 1-8.
4. Detection of Anonymising Proxies Using Machine Learning
5. Peterson A. 2014. ‘The Sony Pictures hack explained.’ Washington Post 18 December. Available at: https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/ Peterson A. 2014. ‘The Sony Pictures hack explained.’ Washington Post 18 December. Available at: https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/