共 73 条
- [1] Anderson B., 2017, P IEEE C COMM NETW S, P1
- [2] TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior [J]. IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, 2019, : 379 - 392
- [3] Deciphering malware's use of TLS (without decryption) [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (03): : 195 - 211
- [4] Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity [J]. KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 1723 - 1732
- [5] Identifying Encrypted Malware Traffic with Contextual Flow Data [J]. AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, : 35 - 46
- [6] [Anonymous], 2018, 8472 RFC
- [7] [Anonymous], Https encryption on the web
- [8] [Anonymous], 2021, SPLITCAP
- [9] [Anonymous], 2020, SCAPY PACKET CRAFTIN
- [10] [Anonymous], ISCX VPN-nonVPN Encrypted Network Traffic Dataset