Author:
Kozachok A. V.,Spirin A. A.
Reference39 articles.
1. Le, D.C., Zincir-Heywood, N., and Heywood, M.I., Analyzing data granularity levels for insider threat detection using machine learning, IEEE Trans. Network Serv. Manage., 2020, vol. 17, no. 1, pp. 30–44.
2. Bhatiaa, A., Bahugunaa, A.A., Tiwaria, K., Haribabua, K., and Vishwakarmab, D., A survey on analyzing encrypted network traffic of mobile devices, arXiv preprint, 2020.
3. Mamun, M.S.I., Ghorbani, A.A., and Stakhanova, N., An entropy based encrypted traffic classifier, Lecture Notes Comput. Sci. 2015, vol. 9543. https://doi.org/10.1007/978-3-319-29814-6_23
4. Shen, M., Wei, M., Zhu, L., and Wang, M., Classification of encrypted traffic with second-order Markov chains and application attribute bigrams, IEEE Trans. Inf. Forensics Secur., 2017, vol. 12, no. 8, pp. 1830–1843. https://doi.org/10.1109/TIFS.2017.2692682
5. Zhang, Z., Kang, C., Fu, P., Cao, Z., Li, Z., and Xiong, G., Metric learning with statistical features for network traffic classification, Proc. IEEE 36th Int. Performance Computing and Communications Conf. (IPCCC), San Diego, 2017, pp. 1–7. https://doi.org/10.1109/PCCC.2017.8280467
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data;Lightweight Cryptographic Techniques and Cybersecurity Approaches;2022-10-05
2. An Encrypted File Detection Algorithm;Automatic Control and Computer Sciences;2021-12