1. Blake Anderson , Andrew Chi , Scott Dunlop , and David McGrew . 2019. Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption(CODASPY ’19) . Association for Computing Machinery , New York, NY, USA , 267–278. https://doi.org/10.1145/329 2006 .3300025 Blake Anderson, Andrew Chi, Scott Dunlop, and David McGrew. 2019. Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption(CODASPY ’19). Association for Computing Machinery, New York, NY, USA, 267–278. https://doi.org/10.1145/3292006.3300025
2. Blake Anderson and David A. McGrew . 2017 . Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity . In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17 , 2017. ACM, 1723–1732. https://doi.org/10.1145/3097983.3098163 Blake Anderson and David A. McGrew. 2017. Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017. ACM, 1723–1732. https://doi.org/10.1145/3097983.3098163
3. Mohammad Bagher Bahador , M. Abadi , and Asghar Tajoddin . 2014 . HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition . 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) (2014), 703–708. Mohammad Bagher Bahador, M. Abadi, and Asghar Tajoddin. 2014. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition. 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) (2014), 703–708.
4. Karel Bartos , Michal Sofka , and Vojtech Franc . 2016 . Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants. In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA , August 10-12, 2016. 807–822. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/bartos Karel Bartos, Michal Sofka, and Vojtech Franc. 2016. Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. 807–822. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/bartos
5. Terry Benzel 2007 . Design, Deployment, and Use of the DETER Testbed . In DETER Community Workshop on Cyber Security Experimentation and Test. Terry Benzel 2007. Design, Deployment, and Use of the DETER Testbed. In DETER Community Workshop on Cyber Security Experimentation and Test.