共 20 条
[11]
Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI [DOI 10.1145/1656274.1656278, 10.1145/1656274.1656278]
[12]
ISCXFlowMeter, 2016, INF SEC CTR EXC
[13]
Johnson A., 2013, ACM SIGSAC C COMP CO, P337
[14]
A Critical Evaluation of Website Fingerprinting Attacks
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:263-274
[15]
Ling Z, 2014, IEEE INFOCOM SER, P1402, DOI 10.1109/INFOCOM.2014.6848074
[16]
Mittal P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P215
[18]
Quinlan J.R., 2014, C4. 5: programs for machine learning
[19]
SERJANTOV A, 2003, P EUR S RES COMP SEC, P116
[20]
Shmatikov V, 2006, LECT NOTES COMPUT SC, V4189, P18