Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?

  • Alshammari R
  • Zincir-Heywood A
  • 62

    Readers

    Mendeley users who have this article in their library.
  • 47

    Citations

    Citations of this article.
  • Riyad Alshammari

  • A. Nur Zincir-Heywood

Save time finding and organizing research with Mendeley

Sign up for free