X Liu, Y Sun, L Fang, J Liu, L Yu - Trustworthy Computing and …, 2015 - books.google.com
Analyzing network traffic to detect network security threats has drawn attentions from security
researchers for decades. However, the new characteristics of network traffic, such as …