共 47 条
[21]
Johnson C., 2021, J. Internet Serv. Inf. Secur, V11, P44
[23]
Kaplan M. Oguz, 2020, Procedia Computer Science, V176, P185, DOI 10.1016/j.procs.2020.08.020
[24]
Khorana S., 2017, Journalism after Snowden: The Future of the Free Press in the Surveillance State
[25]
Characterization of Tor Traffic using Time based Features
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:253-262
[26]
Lewman A, 2013, ADVANCES IN CYBER SECURITY: TECHNOLOGY, OPERATIONS, AND EXPERIENCES, P109
[27]
Li M., 2023, Comput. Syst. Sci. Eng., V46
[29]
Marim M.C., 2023, Intell. Syst. Appl., V18
[30]
Mehta S.D., 2020, Int. J. Eng. Res. Technol. (IJERT), V9, P776