The Cost of the "S" in HTTPS, Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, CoNEXT '14, pp.133-140, 2014. ,
DOI : 10.1145/2674005.2674991
System to enable detecting attacks within encrypted traffic, p.652, 2011. ,
Efficiently bypassing SNI-based HTTPS filtering, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.990-995, 2015. ,
DOI : 10.1109/INM.2015.7140423
URL : https://hal.archives-ouvertes.fr/hal-01202712
Early Recognition of Encrypted Applications, Passive and Active Network Measurement, pp.165-175, 2007. ,
DOI : 10.1007/978-3-540-71617-4_17
URL : https://hal.archives-ouvertes.fr/hal-01097556
Machine learning based encrypted traffic classification: Identifying SSH and Skype, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.1-8, 2009. ,
DOI : 10.1109/CISDA.2009.5356534
Digging into HTTPS, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.322-327, 2010. ,
DOI : 10.1145/1879141.1879184
Inferring the source of encrypted HTTP connections, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.255-263, 2006. ,
DOI : 10.1145/1180405.1180437
Website fingerprinting, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.31-42, 2009. ,
DOI : 10.1145/1655008.1655013
Website fingerprinting in onion routing based anonymization networks, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, pp.103-114, 2011. ,
DOI : 10.1145/2046556.2046570
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis, Privacy Enhancing Technologies, pp.143-163, 2014. ,
DOI : 10.1007/978-3-319-08506-7_8
The transport layer security (TLS) protocol version 1.2 (RFC 5246), 2008. ,
Transport layer security (TLS) extensions: Extension definitions (RFC 6066), 2011. ,
Can internet users protect themselves? challenges and techniques of automated protection of HTTP communication Progress in study of encrypted traffic classification, Trustworthy Computing and Services, pp.457-467, 2011. ,
Traffic identification engine: an open platform for traffic classification, Network, IEEE, vol.28, issue.2, pp.56-64, 2014. ,
Genetic optimization and hierarchical clustering applied to encrypted traffic identification, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp.194-201, 2011. ,
DOI : 10.1109/CICYBS.2011.5949391
Reviewing traffic classification, " in Data Traffic Monitoring and Analysis, pp.123-147, 2013. ,
A survey of techniques for internet traffic classification using machine learning, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.56-76, 2008. ,
DOI : 10.1109/SURV.2008.080406
An investigation on identifying SSL traffic, 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp.115-122, 2011. ,
DOI : 10.1109/CISDA.2011.5945943
A survey of methods for encrypted traffic classification and analysis, International Journal of Network Management, vol.21, issue.4, pp.355-374, 2015. ,
DOI : 10.1002/nem.1901
Traffic analysis of SSL encrypted web browsing, 1998. ,
A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp.487-490, 2015. ,
DOI : 10.1109/APNOMS.2015.7275373
A Multi-Level Approach to SCOP Fold Recognition, Fifth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'05), pp.57-64, 2005. ,
DOI : 10.1109/BIBE.2005.5
Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic, 2011 10th International Conference on Machine Learning and Applications and Workshops, pp.358-361, 2011. ,
DOI : 10.1109/ICMLA.2011.162
Towards real-time processing for application identification of encrypted traffic, 2014 International Conference on Computing, Networking and Communications (ICNC), pp.136-140, 2014. ,
DOI : 10.1109/ICCNC.2014.6785319
Real-Time Traffic Classification Based on Statistical and Payload Content Features, 2010 2nd International Workshop on Intelligent Systems and Applications, pp.1-4, 2010. ,
DOI : 10.1109/IWISA.2010.5473467
Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, p.11, 2008. ,
DOI : 10.1145/1544012.1544023
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?, Computer Networks, vol.55, issue.6, pp.1326-1350, 2011. ,
DOI : 10.1016/j.comnet.2010.12.002
Network intrusion detection using random forests, Third Annual Conference on Privacy, Security and Trust, Proceedings, 2005. ,
PhishScore: Hacking phishers' minds, 10th International Conference on Network and Service Management (CNSM) and Workshop, pp.46-54, 2014. ,
DOI : 10.1109/CNSM.2014.7014140
URL : https://hal.archives-ouvertes.fr/hal-01094238