共 22 条
- [1] Abadi M, 2015, 12 USENIX S OPERATIN
- [2] Aceto G, 2018, 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA)
- [3] Chen Wei, 2012, Computer Engineering, V38, P22, DOI 10.3969/j.issn.1000-3428.2012.12.006
- [4] A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 41 - 45
- [5] Chollet F., 2015, keras
- [6] Guo H., 2004, SIGKDD Explor. Newsl, V6, P30, DOI [DOI 10.1145/1007730.1007736, 10.1145/1007730.1007736]
- [7] Habibi Lashkari A., 2016, Characterization of encrypted and vpn traffic using time-related features, 02
- [8] HU W, 2017, ARXIV170205983
- [9] Japkowicz N., 2002, Intelligent Data Analysis, V6, P429