Login / Signup
Protocol-independent identification of encrypted video traffic sources using traffic analysis.
Yan Shi
Subir Biswas
Published in:
ICC (2016)
Keyphrases
</>
traffic analysis
ip addresses
network traffic
network security
traffic data
internet traffic
stepping stones
video data
multimedia
video content
video sequences
data sources
traffic flow
databases
computer networks
wireless networks
genetic algorithm