共 33 条
- [1] WU L F, HONG Z, PAN Y., Network protocol reverse analysis and application, (2016)
- [2] ANDERSON B, MCGREW D., Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1723-1732, (2017)
- [3] HINTON G, SALAKHUTDINOV R., Reducing the dimensionality of data with neural networks, Science, 313, 5786, pp. 504-507, (2006)
- [4] QI Y, XU L, YANG B, Et al., Packet classification algorithms: from theory to practice[J], Proceedings - IEEE INFOCOM, 13, 10, pp. 648-656, (2009)
- [5] FIVOS C, PANAYIOTIS M., Identifying known and unknown peer-to-peer traffic, Proceedings of IEEE International Symposium on Network Computing & Applications, pp. 93-102, (2006)
- [6] THAY C, VISOOTTIVISETH V, MONGKOLLUKSAMEE S., P2P traffic classification for residential network, Computer Science & Engineering Conference, pp. 1-6, (2016)
- [7] CHUNG J, PARK B, WON Y, Et al., Traffic classification based on flow similarity, IEEE International Workshop on IP Operations & Management, pp. 65-77, (2009)
- [8] ROCHA E, SALVADOR P, NOGUEIRA A., Detection of illicit network activities based on multivariate Gaussian fitting of multi-scale traffic characteristics, 2011 IEEE International Conference on Communications, pp. 1-6, (2011)
- [9] TAYLOR V, SPOLAOR R, CONTI M, Et al., Robust smartphone App identification via encrypted network traffic analysis, IEEE Transactions on Information Forensics & Security, 13, 1, pp. 63-78, (2017)
- [10] BLAKE A, SUBHARTHI P, DAVID M., Deciphering malware's use of TLS (without decryption), (2017)