Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.31-2435, 1999. ,
DOI : 10.1016/S1389-1286(99)00112-7
Voelker: Unexpected means of protocol inference, In: Internet Measurement Confererence, 2006. ,
Timing analysis of keystrokes and timing attacks on ssh, Proc. 10th USENIX Security Symposium, 2001. ,
Fingerprinting Websites Using Traffic Analysis, 2002. ,
DOI : 10.1007/3-540-36467-6_13
A statistical signature-based approach to ip traffic classification, 2004. ,
Flow Clustering Using Machine Learning Techniques, In: Passive and Active Measurement, 2004. ,
DOI : 10.1007/978-3-540-24668-8_21
Traffic Classification Using a Statistical Approach, Passive and Active Measurement, 2005. ,
DOI : 10.1007/978-3-540-31966-5_25
Internet traffic classification using bayesian analysis, In: Sigmetrics, 2005. ,
DOI : 10.1145/1071690.1064220
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.2173
Traffic classification using clustering algorithms, Proceedings of the 2006 SIGCOMM workshop on Mining network data , MineNet '06, pp.281-286, 2006. ,
DOI : 10.1145/1162678.1162679
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.6051
Early application identification, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006. ,
DOI : 10.1145/1368436.1368445
URL : https://hal.archives-ouvertes.fr/hal-01097554
On inferring application protocol behaviors in encrypted network traffic, the Journal of Machine Learning Research Special Topic on Machine Learning for Computer Security, 2006. ,
Blinc: Multilevel traffic classification in the dark, In: SIGCOMM, 2005. ,
Using visual motifs to classify encrypted traffic, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, 2006. ,
DOI : 10.1145/1179576.1179584