作者: ČermákMilan , DrašarMartin , ČeledaPavel , VelanPetr
关键词:
摘要: … of encrypted network traffic can be performed, the traffic … are less affected by encryption than deep packet inspection … structure of encryption protocols can be used to detect these …