Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 6 of 1016
Back to Result List

Investigation of Encrypted and Obfuscated Network Traffic Utilizing Machine Learning

Export metadata

Additional Services

Search Google Scholar Check availability

Statistics

Show usage statistics
Metadaten
Document Type:Conference Object
Language:English
Author:Kay Boldt, Kenneth B. Kent, Rainer Herpers
Parent Title (English):CASCON '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering
First Page:43
Last Page:52
URL:https://dl.acm.org/doi/abs/10.5555/3432601.3432608
Publisher:IBM Corp.
Place of publication:Riverton, NJ, USA
Date of first publication:2020/11/10
Copyright:© 2020 Copyright held by the owner/author(s).
Departments, institutes and facilities:Fachbereich Informatik
Institute of Visual Computing (IVC)
Dewey Decimal Classification (DDC):0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik
Entry in this database:2020/09/25