共 50 条
- [22] ANDROID MALWARE CLASSIFICATION APPROACH BASED ON HOST-LEVEL ENCRYPTED TRAFFIC SHAPING 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 246 - 249
- [23] POSTER: Identifying Dynamic Data Structures in Malware CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1772 - 1774
- [24] On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1416 - 1423
- [25] Identifying P2P network activities on encrypted traffic 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 893 - 899
- [26] Identifying Skype Traffic in a Large-Scale Flow Data Repository TRAFFIC MONITORING AND ANALYSIS: THIRD INTERNATIONAL WORKSHOP, TMA 2011, 2011, 6613 : 72 - +
- [27] Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 1723 - 1732
- [29] Malware Classification Method Based on Sequence of Traffic Flow 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 230 - 237
- [30] A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers APPLIED SCIENCES-BASEL, 2022, 12 (01):