B Qu, Z Zhang, L Guo, D Meng - Proceedings of the 2012 IEEE Seventh …, 2012 - dl.acm.org
The widely employment of traffic encryption, tunneling and other protection/obfuscation
mechanisms in modern network applications, prompts the emergence of traffic behavior (ie …