作者: Jan Kohout , Tomáš Komárek , Přemysl Čech , Jan Bodnár , Jakub Lokoč
DOI: 10.1016/J.ESWA.2018.02.010
关键词: Malware 、 Encryption 、 Protocol (object-oriented programming) 、 The Internet 、 Information retrieval 、 Representation (mathematics) 、 Computer science 、 Task (computing) 、 Process (computing)
摘要: … and representation of encrypted communication from logs of … contextual information of the encrypted requests. This helps to … for comparison with GMM-based model presented below. …