Showing 1 - 4 results of 4 for search '"malicious encrypted traffic"', query time: 0.64s Refine Results
  1. 1
  2. 2
  3. 3

    Confirmation method for the detection of malicious encrypted traffic with data privacy protection by Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU

    Published 2022-02-01
    Subjects: “…malicious encrypt traffic;machine learning;secure two-party computation;automatic confirmation…”
    Get full text
    Article
  4. 4