[1] A. R. Bahlali, A. Bachir, and A. Cheriet, “Malicious encrypted network traffic detection using deep auto-encoder with a custom reconstruction loss,” in 2023 International Symposium on Networks, Computers and Communications (ISNCC), 2023.
[2] J. Cao et al., “An improved network traffic classification model based on a support vector machine,” Symmetry, vol. 12, no. 2, p. 301, 2020, doi: 10.3390/sym12020301.
[3] P. Choorod, T. J. Bauer, and A. Aßmuth, “Distinguishing Tor from other encrypted network traffic through character analysis,” arXiv preprint arXiv:2405.09412, 2024.
[4] Y. Cui and A. Li, “Research on network encrypted traffic detection technology based on CNN + LSTM,” in 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC), 2024.
[5] L. Deri and F. Fusco, “Using deep packet inspection in cybertraffic analysis,” in 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, doi: 10.1109/CSR51186.2021.9527976.
[6] C. Hardegen et al., “Predicting network flow characteristics using deep learning and real-world network traffic,” IEEE Trans. Netw. Serv. Manage., vol. 17, no. 4, pp. 2662–2676, 2020.
[7] E. Horowicz, T. Shapira, and Y. Shavitt, “Self-supervised traffic classification: Flow embedding and few-shot solutions,” IEEE Trans. Netw. Serv. Manage., 2024, doi: 10.1109/TNSM.2024.3366848.
[8] E. Horowicz, T. Shapira, and Y. Shavitt, “A few shots traffic classification with mini-flowpic augmentations,” in Proc. 22nd ACM Internet Measurement Conference, 2022, doi: 10.1145/3517745.3561436.
[9] S. Li et al., “Network traffic prediction based on the feature of newly-generated network flows,” in 2022 IFIP Networking Conference (IFIP Networking), 2022.
[10] X. Liu et al., “Mal‑lightDet: A light method to detect malicious encrypted traffic based on machine learning,” in Proc. 4th Int. Conf. Control, Robotics and Intelligent System, 2023, doi: 10.1145/3622896.3622907.
[11] Y. Liu et al., “Encrypted malicious traffic detection based on graph convolutional network and temporal dissection,” in 2024 27th Int. Conf. Comput. Supported Cooperative Work in Design (CSCWD), 2024.
[12] M. Lotfollahi et al., “Deep packet: A novel approach for encrypted traffic classification using deep learning,” Soft Comput., vol. 24, no. 3, pp. 1999–2012, 2020, doi: 10.1007/s00500‑019‑04030‑2.
[13] S. Mascarenhas and M. Agarwal, “A comparison between VGG16, VGG19 and ResNet50 architecture frameworks for image classification,” in 2021 Int. Conf. Disruptive Technol. for Multi-Disciplinary Res. and Appl. (CENTCON), 2021.
[14] S. Rezaei, B. Kroencke, and X. Liu, “Large-scale mobile app identification using deep learning,” IEEE Access, vol. 8, pp. 348–362, 2019.
[15] T. Shapira and Y. Shavitt, “FlowPic: A generic representation for encrypted traffic classification and applications identification,” IEEE Trans. Netw. Serv. Manage., vol. 18, no. 2, pp. 1218–1232, 2021, doi: 10.1109/TNSM.2021.3071441.
[16] M. Shen et al., “Machine learning-powered encrypted network traffic analysis: A comprehensive survey,” IEEE Commun. Surveys Tuts., vol. 25, no. 1, pp. 791–824, 2022, doi: 10.1109/COMST.2022.3208196.
[17] G. Siracusano et al., “Re-architecting traffic analysis with neural network interface cards,” in Proc. 19th USENIX Symp. Netw. Syst. Design and Implementation (NSDI 22), 2022.
[18] L. Swarup, “Encrypted traffic analysis for malware detection using deep learning,” in 2023 IEEE Int. Conf. ICT in Business Industry & Government (ICTBIG), 2023.
[19] V. Tong et al., “A novel QUIC traffic classifier based on convolutional neural networks,” in 2018 IEEE Global Communications Conference (GLOBECOM), 2018.
[20] A. Finamore, C. Wang, J. Krolikowski, J. M. Navarro, F. Chen, and D. Rossi, “Curated UCDAVIS19 dataset for replication: Contrastive learning and data augmentation in traffic classification using a Flowpic input representation,” Figshare, Oct. 2023. [Online]. Available: https://doi.org/10.6084/m9.figshare.23538141.
[21] J. Xing and C. Wu, “Detecting anomalies in encrypted traffic via deep dictionary learning,” in IEEE INFOCOM 2020–IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), 2020.
[22] X. Yang, N. Angkawisittpan, and X. Feng, “Analysis of an enhanced random forest algorithm for identifying encrypted network traffic,” EUREKA: Physics and Engineering, no. 5, pp. 201–212, 2024, doi: 10.21303/2461‑4262.2024.003372.
[23] N. Zhou, “Image recognition in depth: Comparative study of CNN and pre‑trained VGG16 architecture for classification tasks,” in Proc. Second Int. Conf. Physics, Photonics, and Optical Engineering (ICPPOE 2023), 2024, doi: 10.1117/12.3026829.
[24] Y. Zion, P. Aharon, R. Dubin, A. Dvir, and C. Hajaj, “Enhancing encrypted internet traffic classification through advanced data augmentation techniques,” arXiv preprint arXiv:2407.16539, 2024.