2019
DOI: 10.1007/s12083-019-00803-6
|View full text |Cite
|
Sign up to set email alerts
|

Complex application identification and private network mining algorithm based on traffic-aware model in large-scale networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Mario et al [13] propose an enhanced detection method of encrypted Skype traffic by using an ad-hoc developed enhanced probe (ESkyPRO) which correlate the information received by ESkyPRO and other types of data obtained by an Intrusion Detection System (IDS) probe. Tian et al [14] put forwards to the effective behavior model, which can effectively identify complex applications. Huang et al [15] chooses Skype as the analysis object and propose the complex private network mining technology, which can solve many difficulties and challenges of CA identification.…”
Section: Related Workmentioning
confidence: 99%
“…Mario et al [13] propose an enhanced detection method of encrypted Skype traffic by using an ad-hoc developed enhanced probe (ESkyPRO) which correlate the information received by ESkyPRO and other types of data obtained by an Intrusion Detection System (IDS) probe. Tian et al [14] put forwards to the effective behavior model, which can effectively identify complex applications. Huang et al [15] chooses Skype as the analysis object and propose the complex private network mining technology, which can solve many difficulties and challenges of CA identification.…”
Section: Related Workmentioning
confidence: 99%