共 25 条
[1]
Anderson B., 2017, P IEEE C COMM NETW S, P1
[2]
Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity
[J].
KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2017,
:1723-1732
[3]
[Anonymous], 2017, IOT CONN OUTL MOB RE
[4]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[5]
Apthorpe N., 2016, WORKSH DAT DAT
[6]
Apthorpe N. J., 2017, ABS170805044 CORR
[7]
Baldini G., 2017, 2017 International Carnahan Conference on Security Technology (ICCST), P1
[8]
Basu S., 2002, MACHINE LEARNING, P27
[9]
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting
[J].
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017),
2017,
:373-386
[10]
Fonseka P, 2018, 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P736, DOI 10.1109/WF-IoT.2018.8355105