共 370 条
[2]
Aceto G, 2018, 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA)
[3]
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[4]
Akcora CG, 2020, PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P4439
[5]
A Look at the ECS Behavior of DNS Resolvers
[J].
IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE,
2019,
:116-129
[6]
Adaptive Encrypted Traffic Fingerprinting With Si-Directional Dependence
[J].
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016),
2016,
:177-188
[8]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[9]
Smart at what cost? Characterising Mobile Deep Neural Networks in the wild
[J].
PROCEEDINGS OF THE 2021 ACM INTERNET MEASUREMENT CONFERENCE, IMC 2021,
2021,
:658-672
[10]
Alrawi O, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3505