[1] |
中国信息安全测评中心.中国国家信息安全漏洞库[EB/OL]..
|
[2] |
肖梅,辛阳. 基于朴素贝叶斯算法的VoIP流量识别技术研究[J]. 信息网络安全,2015(10):74-79.
|
[3] |
PETER E.How Unique Is Your Web Browser?[C]//Hannes Federrath,University of Regensburg. Privacy Enhancing Technologies Symposium,July 21-23, 2010,Berlin, Germany. New York:Springer,2010:1-18.
|
[4] |
NICK N,ALEXANDROS K,WOUTER J,et al.Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting[C]// International Computer Science Institute and Lawrence Berkeley National Laboratory. IEEE Symposium on Security and Privacy,May 19-22, 2013,San Francisco, California.Washington:IEEE CS,2013:541-555.
|
[5] |
YU Jiangmin, ERIC C T.Identifying Web Browsers in Encrypted Communications[C]// ACM. Workshop on Privacy in the Electronic Society,November 3-5,2014, Scottsdale, Arizona, USA. New York:ACM,2014:135-138.
|
[6] |
李天枫,姚欣,王劲松.大规模网络异常流量实时云监测平台研究[J]. 信息网络安全,2014(9):1-5.
|
[7] |
刘熙. 浅析浏览器的工作原理[J]中国科技财富,2012(17):98-99.
|
[8] |
KEVIN P D, SCOTT E C, TOMAS R, et al.Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail[C]// IEEE. IEEE Symposium on Security and Privacy,May 20-23 ,2012, San Francisco, USA.Washington:IEEE CS,2012:332-346.
|
[9] |
DOMINIK H,ROLF W, HANNES F.Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naive-bayes Classifier[C]//ACM. CCSW,November 13-15, 2009,Chicago, USA. New York:ACM, 2009:31-42.
|
[10] |
MARC L, BRIAN N L.Inferring the Source of Encrypted HTTP Connections[C]// ACM. ACM CCS,November 3-5, 2006,Alexandria, USA. New York:ACM, 2006:255-263.
|
[11] |
陈学敏,沙灜. 基于浏览器测试组件的社交网络数据获取技术研究[J]. 信息网络安全,2015(5):56-61.
|