1. Can encrypted traffic be identified without port numbers, ip addresses and payload inspection?;Alshammari R.;Elsevier,2010
2. Fast condensed nearest neighbor rule
3. C. Bacquet K. Gumus D. Tizer A. N. Zincir-Heywood and M. I. Heywood. A comparison of unsupervised learning techniques for encrypted traffic identification. 2010. C. Bacquet K. Gumus D. Tizer A. N. Zincir-Heywood and M. I. Heywood. A comparison of unsupervised learning techniques for encrypted traffic identification. 2010.