1. Mohammed Alrowaily , Freeh Alenezi , and Zhuo Lu. 2019. Effectiveness of Machine Learning Based Intrusion Detection Systems . In Security, Privacy, and Anonymity in Computation, Communication, and Storage . Springer International Publishing , Cham , 277–288. Mohammed Alrowaily, Freeh Alenezi, and Zhuo Lu. 2019. Effectiveness of Machine Learning Based Intrusion Detection Systems. In Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer International Publishing, Cham, 277–288.
2. Md. Sarfaraj Alam Ansari , Kunwar Pal , Mahesh Chandra Govil , Prajjval Govil , and Adarsh Srivastava . 2022. P2P Traffic Identification Using Machine Learning and Feature Selection Techniques . In Edge Analytics . Springer Singapore , Singapore , 393–407. https://doi.org/10.1007/978-981-19-0019-8_30 10.1007/978-981-19-0019-8_30 Md. Sarfaraj Alam Ansari, Kunwar Pal, Mahesh Chandra Govil, Prajjval Govil, and Adarsh Srivastava. 2022. P2P Traffic Identification Using Machine Learning and Feature Selection Techniques. In Edge Analytics. Springer Singapore, Singapore, 393–407. https://doi.org/10.1007/978-981-19-0019-8_30
3. Independent comparison of popular DPI tools for traffic classification
4. CISCO. 2018. Encrypted Traffic Analytics. https : lwww.cisco.com/cldamlen/us/solutions/collateralVenterprise-networks/enterprise-network-security/nb-09-encrytd-traf-anlytcs-wp-cte-en. CISCO. 2018. Encrypted Traffic Analytics. https : lwww.cisco.com/cldamlen/us/solutions/collateralVenterprise-networks/enterprise-network-security/nb-09-encrytd-traf-anlytcs-wp-cte-en.
5. DISSENT. 2022. Hackers leak 190GB of alleged Samsung data source code. https://www.databreaches.net/hackers-leak-190gb-of-alleged-samsung-data-source-code. DISSENT. 2022. Hackers leak 190GB of alleged Samsung data source code. https://www.databreaches.net/hackers-leak-190gb-of-alleged-samsung-data-source-code.