Cited By
View all- Meng QYuan QWang XWang YLi GZhu YLu S(2025)Beyond known threats: A novel strategy for isolating and detecting unknown malicious trafficJournal of Information Security and Applications10.1016/j.jisa.2024.10392089(103920)Online publication date: Mar-2025
- Sharma ALashkari A(2025)A survey on encrypted network traffic: A comprehensive survey of identification/classification techniques, challenges, and future directionsComputer Networks10.1016/j.comnet.2024.110984257(110984)Online publication date: Feb-2025
- Mei YLuktarhan NZhao GYang X(2024)An Encrypted Traffic Classification Approach Based on Path Signature Features and LSTMElectronics10.3390/electronics1315306013:15(3060)Online publication date: 2-Aug-2024
- Show More Cited By