[1] SHERRY J, LAN C, POPA R A, et al. BlindBox:deep packet inspection over encrypted traffic[J]. ACM SIGCOMM Computer Communication Review, 2015, 45(4):213-226. [2] YAO Z J, GE J G, WU Y L, et al. Encrypted traffic classification based on Gaussian mixture models and hidden Markov models[J]. Journal of Network and Computer Applications, 2020, 166:No. 102711. [3] WANG W, ZHU M, WANG J L, et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]//Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics. Piscataway:IEEE, 2017:43-48. [4] REN X M, GU H X, WEI W T. Tree-RNN:tree structural recurrent neural network for network traffic classification[J]. Expert Systems with Applications, 2021, 167:No. 114363. [5] 张震, 汪斌强, 李向涛, 等. 基于近邻传播学习的半监督流量分类方法[J]. 自动化学报, 2013, 39(7):1100-1109.(ZHANG Z, WANG B Q, LI X T, et al. Semi-supervised traffic identification based on affinity propagation[J]. Acta Automatica Sinica, 2013, 39(7):1100-1109.) [6] 朱玉娜, 韩继红, 袁霖, 等. 面向密码协议在线安全性的监测方法[J]. 通信学报, 2016, 37(6):75-85.(ZHU Y N, HAN J H, YUAN L, et al. Monitoring approach for online security of cryptographic protocol[J]. Journal on Communications, 2016, 37(6):75-85.) [7] XIE G W, ILIOFOTOU M, KERALAPURA R, et al. SubFlow:towards practical flow-level traffic classification[C]//Proceeding of the 2012 IEEE International Conference on Computer Communication. Piscataway:IEEE, 2012:2541-2545. [8] GAN G, WU J. A convergence theorem for the Fuzzy Subspace Clustering (FSC) algorithm[J]. Pattern Recognition, 2008, 41(6):1939-1947. [9] GRIMAUDO L, MELLIA M, BARALIS E, et al. SeLeCT:selflearning classifier for internet traffic[J]. IEEE Transactions on Network and Service Management, 2014, 11(2):144-157. [10] HAFFNER P, SEN S, SPATSCHECKO, et al. ACAS:automated construction of application signatures[C]//Proceeding of the 2005 ACM SIGCOMM Workshop on Mining Network Data. New York:ACM, 2005:197-202. [11] ZHANG J, CHEN C, XIANG Y, et al. An effective network traffic classification method with unknown flow detection[J], IEEE Transactions on Network and Service Management, 2013, 10(2):133-147. [12] WAGSTAFF K, CARDIE C, ROGERS S, et al. Constrained Kmeans clustering with background knowledge[C]//Proceeding of the 18th International Conference on Machine Learning. San Francisco:Morgan Kaufmann Publishers Inc., 2001:577-584. [13] BERNAILLE L, TEIXEIRA R, SALAMATIAN K. Early application identification[C]//Proceeding of the 2006 ACM CoNEXT Conference. New York:ACM, 2006:No. 6. [14] 王晨宇, 汪定, 王菲菲, 等. 面向多网关的无线传感器网络多因素认证协议[J]. 计算机学报, 2020, 43(4):683-700.(WANG C Y, WANG D, WANG F F, et al. Multi-factr user authentication scheme for multi-gateway wireless sensor networks[J]. Chinese Journal of Computers, 2020, 43(4):683-700.) [15] WANG D, WANG P. Two birds with one stone:two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15(4):708-722. |