A Survey on Internet Traffic Identification, IEEE Communications Surveys & Tutorials, vol.11, issue.3, pp.37-52, 2009. ,
DOI : 10.1109/SURV.2009.090304
Cyber situational awareness ??? A systematic review of the literature, Computers & Security, vol.46, pp.18-31, 2014. ,
DOI : 10.1016/j.cose.2014.06.008
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX, IEEE Communications Surveys & Tutorials, vol.16, issue.4, pp.2037-2064, 2014. ,
DOI : 10.1109/COMST.2014.2321898
URL : http://porto.polito.it/2658703/1/tutorial.pdf
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting, EURASIP Journal on Information Security, vol.16, issue.4, 2016. ,
DOI : 10.1007/978-3-642-40552-5_13
Determining Asset Criticality for Cyber Defense, 2011. ,
DOI : 10.21236/ADA550373
URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a550373.pdf
Cyber Defense and Situational Awareness, pp.978-981, 2014. ,
DOI : 10.1007/978-3-319-11391-3
A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks, Computer Networks, vol.52, issue.11, pp.2097-2128, 2008. ,
DOI : 10.1016/j.comnet.2008.03.006
Continuous Monitoring System Based on Systems's Environment, Proceedings of the Conference on Digital Forensics, Security and Law. p. 151. Association of Digital Forensics, 2015. ,
Know Your Achilles' Heel, Proceedings of the 31st Annual Computer Security Applications Conference on, ACSAC 2015, pp.41-50, 2015. ,
DOI : 10.1109/INFOCOM.2014.6848158
Automated traffic classification and application identification using machine learning, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, pp.250-257, 2005. ,
DOI : 10.1109/LCN.2005.35
URL : http://researchrepository.murdoch.edu.au/id/eprint/35006/1/automated%20traffic.pdf
Robust network traffic identification with unknown applications, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.405-414, 2013. ,
DOI : 10.1145/2484313.2484366