共 55 条
[2]
Afzal MZ, 2015, PROC INT CONF DOC, P1111, DOI 10.1109/ICDAR.2015.7333933
[5]
Identifying Encrypted Malware Traffic with Contextual Flow Data
[J].
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY,
2016,
:35-46
[6]
[Anonymous], 2020, WIK CONTR
[7]
[Anonymous], 2014, 2014 USENIX ANN TECH
[8]
[Anonymous], 2017, P NIPS
[9]
[Anonymous], 2007, P 24 INT C MACH LEAR, DOI 10.1145/1273496.1273523
[10]
[Anonymous], PROC CVPR IEEE