A Comparison of three machine learning techniques for encrypted network traffic analysis

Daniel J. Arndt, A. Nur Zincir-Heywood

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Citations (Scopus)
Original languageEnglish
Title of host publicationIEEE SSCI 2011 - Symposium Series on Computational Intelligence - CISDA 2011
Subtitle of host publication2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications
Pages107-114
Number of pages8
DOIs
Publication statusPublished - 2011
EventSymposium Series on Computational Intelligence, IEEE SSCI 2011 - 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2011 - Paris, France
Duration: Apr 11 2011Apr 15 2011

Publication series

NameIEEE SSCI 2011 - Symposium Series on Computational Intelligence - CISDA 2011: 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications

Conference

ConferenceSymposium Series on Computational Intelligence, IEEE SSCI 2011 - 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2011
Country/TerritoryFrance
CityParis
Period4/11/114/15/11

ASJC Scopus Subject Areas

  • Artificial Intelligence
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'A Comparison of three machine learning techniques for encrypted network traffic analysis'. Together they form a unique fingerprint.

Cite this