共 50 条
- [42] Deep Packet Inspection using Finate State Machines [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOLUME II, 2009, : 635 - 645
- [43] Bandwidth Management - A Deep Packet Inspection Mathematical Model [J]. 2014 6TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2014, : 169 - 175
- [44] Mobile security using separated deep packet inspection [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 482 - 487
- [45] BlindBox: Deep Packet Inspection over Encrypted Traffic [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 213 - 226
- [46] DPI & DFI: a Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection [J]. 13TH GLOBAL CONGRESS ON MANUFACTURING AND MANAGEMENT, 2017, 174 : 1309 - 1314
- [47] Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection [J]. FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 53 - 68
- [49] Privacy-enhanced Deep Packet Inspection at Outsourced Middlebox [J]. 2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018,
- [50] Boundary hash for memory-efficient Deep Packet Inspection [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1732 - 1737