Early Recognition of Encrypted Applications
暂无分享,去创建一个
[1] Anthony McGregor,et al. Flow Clustering Using Machine Learning Techniques , 2004, PAM.
[2] Anirban Mahanti,et al. Traffic classification using clustering algorithms , 2006, MineNet '06.
[3] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[4] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[5] Matthew Roughan,et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification , 2004, IMC '04.
[6] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[7] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[8] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[9] Renata Teixeira,et al. Early application identification , 2006, CoNEXT '06.
[10] Charles V. Wright,et al. Using visual motifs to classify encrypted traffic , 2006, VizSEC '06.
[11] Renata Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[12] Charles V. Wright,et al. On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..
[13] Andrew W. Moore,et al. Traffic Classification Using a Statistical Approach , 2005, PAM.
[14] Stefan Savage,et al. Unexpected means of protocol inference , 2006, IMC '06.
[15] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.