2015
DOI: 10.1007/978-3-662-47401-3_45
|View full text |Cite
|
Sign up to set email alerts
|

Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic Measurement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…This paper is an extension of our previous work in ATIS2015 . In this paper, we extend the method into the discovery of Tor browsers and pretended Google crawler and also test the method in a large‐scale and high‐speed network environment.…”
Section: Introductionmentioning
confidence: 98%
“…This paper is an extension of our previous work in ATIS2015 . In this paper, we extend the method into the discovery of Tor browsers and pretended Google crawler and also test the method in a large‐scale and high‐speed network environment.…”
Section: Introductionmentioning
confidence: 98%