共 33 条
[1]
ZHAO J J, LI Q, HONG Y P, Et al., MetaRockETC: adaptive encrypted traffic classification in complex network environments via time series analysis and meta-learning, IEEE Transactions on Network and Service Management, 21, 2, pp. 2460-2476, (2024)
[2]
LIU Y, WANG X, QU B, Et al., ATVITSC: A novel encrypted traffic classification method based on deep learning, IEEE Transactions on Information Forensics and Security, 19, pp. 9374-9389, (2024)
[3]
ERMAN J, MAHANTI A, ARLITT M, Et al., Identifying and discriminating between web and peer-to-peer traffic in the network core, Proceedings of the 16th International Conference on World Wide Web, pp. 883-892, (2007)
[4]
YAN H N, LI H, XIAO M C, Et al., PGSM-DPI: precisely guided signature matching of deep packet inspection for traffic analysis, Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, (2019)
[5]
TAYLOR V F, SPOLAOR R, CONTI M, Et al., AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic, Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 439-454, (2016)
[6]
KOUMAR J, HYNEK K, CEJKA T., Network traffic classification based on single flow time series analysis, Proceedings of the 2023 19th International Conference on Network and Service Management (CNSM), pp. 1-7, (2023)
[7]
ZAKI F, AFIFI F, ABD RAZAK S, Et al., GRAIN: Granular multi-label encrypted traffic classification using classifier chain, Computer Networks, 213, (2022)
[8]
SHEN M, LIU Y T, ZHU L H, Et al., Fine-grained webpage fingerprinting using only packet length information of encrypted traffic, IEEE Transactions on Information Forensics and Security, 16, pp. 2046-2059, (2020)
[9]
WANG W, ZHU M, WANG J L, Et al., End-to-end encrypted traffic classification with one-dimensional convolution neural networks, Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43-48, (2017)
[10]
LIN K D, XU X L, GAO H H., TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT, Computer Networks, 190, (2021)