Login / Signup
Two-phased method for identifying SSH encrypted application flows.
Matti Hirvonen
Mirko Sailio
Published in:
IWCMC (2011)
Keyphrases
</>
experimental evaluation
computational cost
high accuracy
main contribution
cost function
mathematical model
computationally efficient
detection method
high precision
modeling method
prior knowledge
dynamic programming
em algorithm
theoretical analysis
error rate
segmentation method