共 21 条
[1]
A Proxy Identifier based on Patterns in Traffic Flows
[J].
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE),
2015,
:118-125
[2]
Investigating Two Different Approaches for Encrypted Traffic Classification
[J].
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS,
2008,
:156-166
[3]
Alshammari Riyad, 2009, 2009 IEEE S COMP INT, P1
[4]
Bremler-Barr A, 2012, IEEE INFOCOM SER, P1987, DOI 10.1109/INFCOM.2012.6195576
[5]
Cao ZG, 2014, COMM COM INF SC, V490, P73
[6]
Chen ZT, 2017, IEEE INT CONF BIG DA, P1271, DOI 10.1109/BigData.2017.8258054
[7]
Deri L, 2014, INT WIREL COMMUN, P617, DOI 10.1109/IWCMC.2014.6906427
[8]
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[9]
Dusi M, 2010, IEEE ICC
[10]
Hamilton WL, 2017, ADV NEUR IN, V30