Early Recognition of Encrypted Applications
- 1 January 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Unexpected means of protocol inferencePublished by Association for Computing Machinery (ACM) ,2006
- Traffic classification using clustering algorithmsPublished by Association for Computing Machinery (ACM) ,2006
- Traffic classification on the flyACM SIGCOMM Computer Communication Review, 2006
- Early application identificationPublished by Association for Computing Machinery (ACM) ,2006
- BLINCPublished by Association for Computing Machinery (ACM) ,2005
- Internet traffic classification using bayesian analysis techniquesPublished by Association for Computing Machinery (ACM) ,2005
- Traffic Classification Using a Statistical ApproachLecture Notes in Computer Science, 2005
- Flow Clustering Using Machine Learning TechniquesLecture Notes in Computer Science, 2004
- Fingerprinting Websites Using Traffic AnalysisLecture Notes in Computer Science, 2003
- Bro: a system for detecting network intruders in real-timeComputer Networks, 1999