Sign in

Poster: Feasibility of Malware Traffic Analysis through TLS-Encrypted Flow Visualization.

Dongeon KimJihun HanJinwoo LeeHeejun RohWonjun Lee
Published in: ICNP (2020)
Keyphrases
  • traffic analysis
  • network security
  • network traffic
  • data analysis
  • internet traffic
  • stepping stones
  • traffic data
  • intrusion detection
  • malware detection
  • databases
  • intrusion detection system
  • computer networks