Traffic Classification for the Detection of Anonymous Web Proxy Routing
暂无分享,去创建一个
[1] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[3] T. Chomsiri. Sniffing Packets on LAN without ARP Spoofing , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[4] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[5] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[6] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Tansel Özyer,et al. Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening , 2007, J. Netw. Comput. Appl..
[8] Bjoern M. Luettmann,et al. Man-in-the-middle attacks on auto-updating software , 2007 .
[9] Marc Dacier,et al. A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.
[10] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[11] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[12] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[13] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[14] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[15] Francisco Herrera,et al. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems , 2015, Expert Syst. Appl..
[16] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[17] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[18] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[19] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.
[20] S. O. Khanna,et al. Overview of Emerging Trends in Network Security and Cryptography , 2014 .
[21] Robin Sommer,et al. Here's my cert, so trust me, maybe?: understanding TLS errors on the web , 2013, WWW.
[22] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[23] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.
[24] Bjoern M. Luettmann,et al. Man-in-the-middle attacks on auto-updating software , 2007, Bell Labs Technical Journal.