Enhanced telemetry for encrypted threat analytics
暂无分享,去创建一个
[1] Benoit Claise,et al. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information , 2013, RFC.
[2] Stephen P. Boyd,et al. An Interior-Point Method for Large-Scale l1-Regularized Logistic Regression , 2007, J. Mach. Learn. Res..
[3] B. S. Manoj,et al. Packet Inspection for Unauthorized OS Detection in Enterprises , 2015, IEEE Security & Privacy.
[4] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] Franco Callegati,et al. Man-in-the-Middle Attack to the HTTPS Protocol , 2009, IEEE Security & Privacy Magazine.
[7] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[8] Sebastian Zander,et al. Automated traffic classification and application identification using machine learning , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[9] Ming Di,et al. Joy , 1889, The Hospital.
[10] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[11] Chris Sanders,et al. Applied Network Security Monitoring: Collection, Detection, and Analysis , 2013 .
[12] Christopher Krügel,et al. BotFinder: finding bots in network traffic without deep packet inspection , 2012, CoNEXT '12.
[13] Subharthi Paul,et al. Deciphering malware’s use of TLS (without decryption) , 2016, Journal of Computer Virology and Hacking Techniques.
[14] Benoit Claise,et al. Cisco Systems NetFlow Services Export Version 9 , 2004, RFC.
[15] Toniann Pitassi,et al. The reusable holdout: Preserving validity in adaptive data analysis , 2015, Science.