共 20 条
[1]
A Proxy Identifier based on Patterns in Traffic Flows
[J].
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE),
2015,
:118-125
[2]
AlSabah Mashael, 2012, P 2012 ACM C COMP CO, P73, DOI [10.1145/2382196.2382208, DOI 10.1145/2382196.2382208]
[3]
[Anonymous], 2004, P 13 C USENIX SEC S, DOI [DOI 10.5555/1251375.1251396, DOI 10.1186/1476-0711-3-21]
[4]
Traffic Identification of Tor and Web-Mix
[J].
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS,
2008,
:548-551
[6]
Chaabane A., 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P167, DOI 10.1109/NSS.2010.47
[7]
Chakravarty Sambuddho, 2014, Passive and Active Measurement. 15th International Conference, PAM 2014. Proceedings: LNCS 8362, P247, DOI 10.1007/978-3-319-04918-2_24
[9]
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[10]
Gaofeng He, 2014, 2014 Second International Conference on Advanced Cloud and Big Data (CBD), P220, DOI 10.1109/CBD.2014.37