共 32 条
[1]
Barmpatsalou K, Cruz T, Monteiro E, Simoes P., Current and future trends in mobile device forensics: A survey, ACM Computing Surveys (CSUR), 51, 3, (2018)
[2]
Yaacoubi O., The rise of encrypted malware, Network Security, 2019, 5, (2019)
[3]
Anderson B, Paul S, Mcgrew D., Deciphering Malware’s use of TLS (without decryption), Journal of Computer Virology and Hacking Techniques, 14, 3, (2018)
[4]
Rossow C, Dietrich CJ., ProVeX: Detecting botnets with encrypted command and control channels, Proc. of the 10th Int’l Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 21-40, (2013)
[5]
Antonakakis M, April T, Bailey M, Et al., Understanding the Mirai botnet, Proc. of the 26th USENIX Security Symp. (USENIX Security 2017), (2017)
[6]
Gu G, Perdisci R, Zhang J, Et al., BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection, Proc. of the Conf. on Security Symp. USENIX Association, pp. 139-154, (2008)
[7]
Zhang XB, Lam SS, Lee DY, Et al., Protocol design for scalable and reliable group rekeying, IEEE/ACM Trans. on Networking, 11, 6, (2003)
[8]
Nguyen TTT, Armitage G., A survey of techniques for Internet traffic classification using machine learning, Communications Surveys & Tutorials, 10, 4, (2008)
[9]
Dainotti A, Pescape A, Claffy KC., Issues and future directions in traffic classification, Network IEEE, 26, 1, (2012)
[10]
Namdev N, Agrawal S, Silkari S., Recent advancement in machine learning based Internet traffic classification, Procedia Computer Ence, 60, pp. 784-791, (2015)