共 50 条
- [12] Voice traffic characterization models in VoIP transport network [J]. Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 473 - 482
- [13] Encrypted Network Traffic Classification: A data driven approach [J]. 2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 706 - 712
- [14] Personal Codes in Longitudinal Studies III The Empirical Test of Fault-Tolerant Linkage of Unencrypted and Encrypted Self-Generated Codes [J]. METHODS DATA ANALYSES, 2011, 5 (01): : 109 - 134
- [15] Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 265 - 272
- [16] Towards Real-time Processing for Application Identification of Encrypted Traffic [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 136 - 140
- [18] Adaptive Encrypted Traffic Characterization via Deep Representation Learning [J]. 2022 INTERMOUNTAIN ENGINEERING, TECHNOLOGY AND COMPUTING (IETC), 2022,