共 36 条
[3]
Identifying Encrypted Malware Traffic with Contextual Flow Data
[J].
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY,
2016,
:35-46
[4]
Asharov G., 2013, P ACM CCS, P1
[5]
Bazuhair W, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P200, DOI [10.1109/CCWC47524.2020.9031116, 10.1109/ccwc47524.2020.9031116]
[6]
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:561-574