Login / Signup

Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic.

Maurizio DusiAlice EsteFrancesco GringoliLuca Salgarelli
Published in: ICC (2009)
Keyphrases