共 51 条
[2]
Afzal Z., 2020, NORDIC C SECURE IT S, P37
[3]
[Anonymous], 2011, Technical report
[4]
[Anonymous], 2017, P IEEE C NETW SOFTW, DOI DOI 10.1109/NETSOFT.2017.8004227
[5]
Bagui S, 2017, Journal of Cyber Security Technology, V1, P108, DOI [10.1080/23742917.2017.1321891, 10.1080/23742917.2017.1321891, DOI 10.1080/23742917.2017.1321891]
[6]
A Big Data-Enabled Hierarchical Framework for Traffic Classification
[J].
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING,
2020, 7 (04)
:2608-2619
[7]
Cao ZG, 2014, COMM COM INF SC, V490, P73
[8]
Chollet F., 2015, keras. io
[9]
Cisco: Cisco Encrypted Traffic Analytics, 2019, CISCO CISCO ENCRYPTE
[10]
Diab WB, 2007, WMUNEP'07: PROCEEDINGS OF THE THIRD ACM WORKSHOP ON WIRELESS MULTIMEDIA NETWORKING AND PERFORMANCE MODELING, P92