Identification of Mobile Service Type of Encrypted Traffic Based on Fusion of Inception andSE-Attention

Mobile devices usually access WLAN and rely on WiFi encryption protocol to encrypt data link layer traffic in the network to maintain communication security.However,existing encrypted traffic identification methods mainly analyze traffic loads at the network layer and above,and cannot effectively id...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Jisuanji kexue
المؤلف الرئيسي: WANG Yijing, WANG Qingxian, DING Dazhao, YAN Tingju, CAO Yan
التنسيق: مقال
اللغة:الصينية
منشور في: Editorial office of Computer Science 2024-10-01
الموضوعات:
الوصول للمادة أونلاين:https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2024-51-10-399.pdf