E. Rescorla, Http over tls, RFC 2818, 2000.

P. Brissaud, J. François, I. Chrisment, T. Cholez, and O. Bettan, Passive monitoring of https service use, 14th International Conference on Network and Service Management (CNSM), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01943936

D. Wagner and B. Schneier, Analysis of the ssl 3.0 protocol, The Second USENIX Workshop on Electronic Commerce Proceedings, 1996.

H. Cheng and R. Avnur, Traffic analysis of ssl encrypted web browsing, 1998.

Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan et al., Statistical identification of encrypted web browsing traffic, Security and Privacy, 2002.

A. Hintz, Fingerprinting websites using traffic analysis, International Workshop on Privacy Enhancing Technologies, 2002.

A. Panchenko, L. Niessen, A. Zinnen, and T. Engel, Website fingerprinting in onion routing based anonymization networks, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011.

X. Cai, X. C. Zhang, B. Joshi, and R. Johnson, Touching from a distance: Website fingerprinting attacks and defenses, Proceedings of the 2012 ACM conference on Computer and communications security, 2012.

T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Goldberg, Effective attacks and provable defenses for website fingerprinting, USENIX Security Symposium, 2014.

J. Hayes and G. Danezis, k-fingerprinting: A robust scalable website fingerprinting technique, USENIX Security Symposium, 2016.

M. Liberatore and B. N. Levine, Inferring the source of encrypted http connections, Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006.

D. Herrmann, R. Wendolsky, and H. Federrath, Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier, Proceedings of the 2009 ACM workshop on Cloud computing security, 2009.

L. Lu, E. Chang, and M. C. Chan, Website fingerprinting and identification using ordered feature sequences, Computer Security -ESORICS 2010, 2010.

J. Sherry, C. Lan, R. A. Popa, and S. Ratnasamy, Blindbox: Deep packet inspection over encrypted traffic, ACM SIGCOMM Computer Communication Review, 2015.

Y. Lin, S. Shen, M. Yang, D. Yang, and W. Chen, Privacy-preserving deep packet filtering over encrypted traffic in software-defined networks, Communications, 2016.

P. Velan, M. ?ermák, P. ?eleda, and M. Dra?ar, A survey of methods for encrypted traffic classification and analysis, International Journal of Network Management, 2015.

W. M. Shbair, T. Cholez, J. Francois, and I. Chrisment, A multilevel framework to identify https services, Network Operations and Management Symposium (NOMS), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01273160

A. Pescape, A. Montieri, G. Aceto, and D. Ciuonzo, Anonymity services tor, i2p, jondonym: Classifying in the dark (web), IEEE Transactions on Dependable and Secure Computing, 2018.

V. F. Taylor, R. Spolaor, M. Conti, and I. Martinovic, Robust smartphone app identification via encrypted network traffic analysis, IEEE Transactions on Information Forensics and Security, 2018.

M. Conti, L. V. Mancini, R. Spolaor, and N. V. Verde, Analyzing android encrypted network traffic to identify user actions, IEEE Transactions on Information Forensics and Security, 2016.

J. Liu, Y. Fu, J. Ming, Y. Ren, L. Sun et al., Effective and real-time in-app activity analysis in encrypted internet traffic streams, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017.

B. Saltaformaggio, H. Choi, K. Johnson, Y. Kwon, Q. Zhang et al., Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic, 10th USENIX Workshop on Offensive Technologies. USENIX Association, 2016.

G. Aceto, D. Ciuonzo, A. Montieri, and A. Pescap, Multi-classification approaches for classifying mobile app traffic, J. Netw. Comput. Appl, 2018.

G. Aceto, D. Ciuonzo, A. Montieri, and A. Pescap, Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges, IEEE Transactions on Network and Service Management, 2019.

G. Aceto, D. Ciuonzo, A. Montieri, V. Persico, and A. Pescap, Know your big data trade-offs when classifying encrypted mobile traffic with deep learning, p.2019

Y. Fu, H. Xiong, X. Lu, J. Yang, and C. Chen, Service usage classification with encrypted internet traffic in mobile messaging apps, IEEE Transactions on Mobile Computing, 2016.

A. Reed and M. Kranch, Identifying https-protected netflix videos in real-time, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017.

C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson, Spot me if you can: Uncovering spoken phrases in encrypted voip conversations, Security and Privacy, 2008.

C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson, Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?, in USENIX Security Symposium, 2007.

S. E. Coull and K. P. Dyer, Traffic analysis of encrypted messaging services: Apple imessage and beyond, ACM SIGCOMM Computer Communication Review, 2014.

D. X. Song, D. Wagner, and X. Tian, Timing analysis of keystrokes and timing attacks on ssh, USENIX Security Symposium, 2001.

, Traffic analysis on google maps with gmaps-trafficker," white paper, 2012.

T. Dierks and E. Rescorla, The transport layer security (tls) protocol version 1.2, RFC, vol.5246, 2008.

, Remove h1 pipeline support, pp.2-2017

R. Peon and M. Thomson, Hypertext transfer protocol version 2 (http/2), 2015.

S. Friedl, A. Popov, A. Langley, and S. Emile, Transport layer security (tls) application-layer protocol negotiation extension, RFC, vol.7301, 2014.

R. Peon, Hpack: Header compression for http/2, 2015.

T. Groleat, S. Vaton, and M. Arzel, High-speed flow-based classification on fpga, International journal of network management, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01058333

B. Xiong, C. Xiao-su, and C. Ning, A real-time tcp stream reassembly mechanism in high-speed network, 2009.

J. Mcauley, C. Targett, Q. Shi, A. Van-den, and . Hengel, Image-based recommendations on styles and substitutes, Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015.

F. Mosteller, Understanding the birthday problem, Selected Papers of Frederick Mosteller, 2006.

E. Parzen, On estimation of a probability density function and mode, The annals of mathematical statistics, 1962.

, Hypertext transfer protocol -http/1.1, IETF, pp.7230-7237, 2014.

I. Grigorik, Optimizing tls record size & buffering latency, Blog, 2013.

L. Breiman, Random forests, Machine learning, 2001.