ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
53
views
0
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,358
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Identifying Encrypted Malware Traffic with Contextual Flow Data
proceedings-article
Author(s):
Blake Anderson
1
,
David McGrew
1
Publication date
(Print):
2016
Publication date
(Print):
2016
Conference name:
the 2016 ACM Workshop (ALSec '16)
Conference date:
November 28, 2016 - November 28, 2016
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Taxonomic intelligence
Author and article information
Conference
Publication date (Print):
2016
Publication date (Print):
2016
Pages
: 35-46
Affiliations
[
1
]
Cisco, San Jose, USA
Article
DOI:
10.1145/2996758.2996768
SO-VID:
f334f830-aa0b-42fc-ad4e-0a7784806ef4
Copyright ©
© 2016
License:
http://www.acm.org/publications/policies/copyright_policy#Background
Conference name:
the 2016 ACM Workshop
Conference acronym:
ALSec '16
Conference number:
2016
Conference location:
Vienna, Austria
Conference date:
November 28, 2016 - November 28, 2016
Conference sponsor:
SIGSAC, ACM Special Interest Group on Security, Audit, and Control
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,358
IoT Malware Analysis
Authors:
Victor Clincy
,
Hossain SHAHRIAR
Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification
Authors:
Scott E. Coull
,
Christopher Gardner
Malware Detection for Mobile Devices Using Software-Defined Networking
Authors:
Ruofan Jin
,
Bing Wang
See all similar
Cited by
6
A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
Authors:
Zhiyi Tian
,
Lei Cui
,
Jie Liang
…
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
Authors:
Zihao Wang
,
Kar Wai Fok
,
Vrizlynn L.L. Thing
MDiET: Malware Detection in Encrypted Traffic
Authors:
Dimitrios Schoinianakis
,
Norbert Goetze
,
Gerald Lehmann
See all cited by