Login / Signup
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes.
Diwen Xue
Michalis Kallitsis
Amir Houmansadr
Roya Ensafi
Published in:
USENIX Security Symposium (2024)
Keyphrases
</>
traffic flow
reverse engineering
network traffic
road traffic
road network
internet traffic
traffic control
traffic monitoring
traffic volume
traffic patterns
telecommunication networks
neural network
intelligent transportation systems
flow control
network layer
real time
parameter estimation
data sets