From post

Mobile Encrypted Traffic Classification Based on Message Type Inference.

, , , , и . CollaborateCom (1), том 406 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 117-137. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper)., , , , и . CollaborateCom, том 268 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 284-294. Springer, (2018)Leopard: Understanding the Threat of Blockchain Domain Name Based Malware., , и . PAM, том 12048 из Lecture Notes in Computer Science, стр. 55-70. Springer, (2020)Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting..A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic., , , , и . ICT, стр. 1-5. IEEE, (2020)Incremental Learning for Mobile Encrypted Traffic Classification., , , , , и . ICC, стр. 1-6. IEEE, (2021)Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach., , , , и . ICNP, стр. 1-11. IEEE, (2019)TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network., , , , , и . ICC, стр. 2319-2324. IEEE, (2023)Detecting Domain Generation Algorithms with Convolutional Neural Language Models., , , , , и . TrustCom/BigDataSE, стр. 1360-1367. IEEE, (2018)Cooperative Work Systems for the Security of Digital Computing Infrastructure., , , , и . ICPADS, стр. 676-681. IEEE Computer Society, (2010)A Machine Learning-based Method for Clustering the Traffic of Linux NATed Network Entities with TCP/IP Feature., , , , и . CSCWD, стр. 1010-1016. IEEE, (2024)Vicinal Data Augmentation for Classification Model via Feature Weaken., , , , , и . KSEM (1), том 14884 из Lecture Notes in Computer Science, стр. 334-346. Springer, (2024)