共 51 条
- [11] Huoh TL, 2021, 2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), P376
- [12] Jacobs Arthur S., 2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, P1537, DOI 10.1145/3548606.3560609
- [13] Characterization of Tor Traffic using Time based Features [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 253 - 262
- [14] ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification [J]. PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, : 633 - 642
- [16] Liu C, 2019, IEEE INFOCOM SER, P1171
- [17] Fast Application Activity Recognition with Encrypted Traffic [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 314 - 325
- [19] Loukas Andreas, 2020, Advances in Neural Information Processing Systems, V33
- [20] ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network [J]. SYMMETRY-BASEL, 2021, 13 (06):