2019 IEEE Symposium on Computers and Communications (ISCC) 2019
DOI: 10.1109/iscc47284.2019.8969663
|View full text |Cite
|
Sign up to set email alerts
|

Applied Comparative Evaluation of the Metasploit Evasion Module

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 7 publications
0
0
0
Order By: Relevance
“…Flow-based machine-learning techniques have emerged as the predominant way of classifying encrypted information. Nevertheless, it is important to highlight that the gathering of training datasets and the use of features for detecting encrypted communication are still subjects of intense investigation [ 22 , 23 , 24 , 25 , 26 ].…”
Section: Related Workmentioning
confidence: 99%
“…Flow-based machine-learning techniques have emerged as the predominant way of classifying encrypted information. Nevertheless, it is important to highlight that the gathering of training datasets and the use of features for detecting encrypted communication are still subjects of intense investigation [ 22 , 23 , 24 , 25 , 26 ].…”
Section: Related Workmentioning
confidence: 99%