共 50 条
- [41] Fingerprinting Web Pages and Smartphone Apps from Encrypted Network Traffic with WebScanner [J]. PROCEEDINGS OF THE 2022 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET 2022), 2022, : 1 - 9
- [43] An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification [J]. COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2009, 63 : 93 - 100
- [44] FLOWGAN:Unbalanced network encrypted traffic identification method based on GAN [J]. 2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 975 - 983
- [45] A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning [J]. APPLIED SCIENCES-BASEL, 2022, 12 (13):
- [46] OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 315 - 334
- [48] Towards Real-time Processing for Application Identification of Encrypted Traffic [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 136 - 140
- [49] An Analysis of Clustering Objectives for Feature Selection Applied to Encrypted Traffic Identification [J]. 2010 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2010,