A Fingerprint Enhancement and Second-Order Markov Chain Based Malicious Encrypted Traffic Identification Scheme.
Daichong ChaoPublished in: ICCAI (2020)
Keyphrases
- markov chain
- transition probabilities
- steady state
- finite state
- monte carlo
- monte carlo simulation
- markov model
- state space
- stochastic process
- markov process
- random walk
- stationary distribution
- monte carlo method
- transition matrix
- higher order
- network traffic
- markov chain monte carlo
- state transition
- neural network
- cross validation
- objective function
- image segmentation
- genetic algorithm
- machine learning