On Inferring Application Protocol Behaviors in Encrypted Network Traffic (Special Topic on Machine Learning for Computer Security)
Charles V. Wright and Fabian Monrose and Gerald M. Masson


Send Feedback Start
   0.000006
DB Connect
   0.000453
Lookup hash in DB
   0.000382
Get torrent details
   0.000116
Get torrent details, finished
   0.000247
Get authors
   0.000002
Select authors
   0.000217
Parse bibtex
   0.000041
Write header
   0.000198
get stars
   0.000102
home tab
   0.000098
render right panel
   0.000007
render ads
   0.000362
fetch current hosters
   0.000237
related datasets
   0.002144
Done