您当前的位置:
首页 >
文章列表页 >
Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic
Cyber Security | 更新时间:2024-12-31
    • Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic

    • Journal on Communications   Vol. 45, Issue Z2, Pages: 44-51(2024)
    • DOI:10.11959/j.issn.1000-436x.2024258    

      CLC: TP393
    • Received:22 October 2024

      Published:30 November 2024

    移动端阅览

  • WEI Yujun,HE Haitao,ZHAO Qiong,et al.Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic[J].Journal on Communications,2024,45(Z2):44-51. DOI: 10.11959/j.issn.1000-436x.2024258.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

755

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Survey of research on encrypted traffic classification based on machine learning
Flow-based electronic resource network behavior analysis practice
Survey of industrial Internet traffic analysis technology
Botnet detection based on generative adversarial network
Port scan detection algorithms based on statistical traffic features

Related Author

Yu Yihan
WANG Kun
LIU Taotao
FU Yu
WEI Yujun
YAO Renlong
ZHAO Qiong
LI Enlei

Related Institution

Department of Information Security, Naval University of Engineering
School of Mathematics and Information Engineering, Xinyang Vocational and Technical College
Department of Operational Operations and Planning, Naval University of Engineering
Institute of Information Engineering, Chinese Academy of Sciences
School of Cyber Security, University of Chinese Academy of Sciences
0