共 29 条
- [1] Zhao B, Guo H, Liu QR, Wu JX., Protocol independent identification of encrypted traffic based on weighted cumulative sum test, Ruan Jian Xue Bao/Journal of Software, 24, 6, pp. 1334-1345, (2013)
- [2] Velan P, Cermak M, Celeda P, Drasar M., A survey of methods for encrypted traffic classification and analysis, Int'l Journal of Network Management, 25, 5, pp. 355-374, (2015)
- [3] Xiang C, Chen Q, Xue M, Zhu H., APPCLASSIFIER: Automated app inference on encrypted traffic via Meta data analysis, Proc. of the 2018 IEEE Global Communications Conf. (GLOBECOM), pp. 1-7, (2018)
- [4] Taylor VF, Spolaor R, Conti M, Martinovic I., Robust smartphone app identification via encrypted network traffic analysis, IEEE Trans. on Information Forensics and Security, 13, 1, pp. 63-78, (2017)
- [5] Anderson B, Paul S, McGrew D., Deciphering Malware's use of TLS (without decryption), Journal of Computer Virology and Hacking Techniques, 14, pp. 195-211, (2018)
- [6] Anderson B, McGrew D., Identifying encrypted Malware traffic with contextual flow data, Proc. of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 35-46, (2016)
- [7] Ahmed ME, Ullah S, Kim H., Statistical application fingerprinting for DDoS attack mitigation, IEEE Trans. on Information Forensics and Security, 14, 6, pp. 1471-1484, (2019)
- [8] Biernacki A., Identification of adaptive video streams based on traffic correlation, Multimedia Tools and Applications, 78, 13, pp. 18271-18291, (2019)
- [9] Li F, Chung JW, Claypool M., Silhouette: Identifying YouTube video flows from encrypted traffic, Proc. of the 28th ACM SIGMM Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 19-24, (2018)
- [10] Tang S, Qin XW, Wei G., Network-based video quality assessment for encrypted HTTP adaptive streaming, IEEE Access, 6, pp. 56246-56257, (2018)