共 41 条
- [21] Korczynski M, 2014, IEEE INFOCOM SER, P781, DOI 10.1109/INFOCOM.2014.6848005
- [22] Characterization of Tor Traffic using Time based Features [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 253 - 262
- [23] Liu C., 2018, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), P1
- [24] McHugh J., 2000, ACM Transactions on Information and Systems Security, V3, P262, DOI 10.1145/382912.382923
- [25] WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 50 - 57
- [27] Santos ACF., 2011, J COMPUTATIONAL INTE, V2, P197
- [28] Shapira T, 2019, IEEE CONF COMPUT, P680, DOI [10.1109/infcomw.2019.8845315, 10.1109/INFCOMW.2019.8845315]
- [30] Siva SDS., 2011, INT J COMPUTER APPL, V31, P1