[1]Zscaler ThreatLabz. ThreatLabz 2023 enterprise IoTOT threat report[EBOL]. 2023 [20250102]. https:www.zscaler.comresourcesindustryreportsthreatlabz2023ent erpriseioTotthreatreport.pdf[2]袁钦献. 加密网络流量分析关键技术研究与开发[D]. 西安: 西安电子科技大学, 2020[3]王洋, 陈紫儿, 柳瑞春, 等. 基于决策树算法的网络加密流量识别方法[J]. 长江信息通信, 2021, 34(11): 1517[4]Wang Y, Xiang Y, Zhang J, et al. A novel semisupervised approach for network traffic clustering[C] Proc of the 5th Int Conf on Network and System Security. Piscataway, NJ: IEEE, 2011: 169175[5]Wang W, Zhu M, Wang J, et al. Endtoend encrypted traffic classification with onedimensional convolution neural networks[C] Proc of the 2017 IEEE Int Conf on Intelligence and Security Informatics (ISI). Piscataway, NJ: IEEE, 2017: 4348[6]Liu C, He L, Xiong G, et al. FSNet: A flow sequence network for encrypted traffic classification[C] Proc of the IEEE Conf on Computer Communications. Piscataway, NJ: IEEE, 2019: 11711179[7]邓昕, 刘朝晖, 欧阳燕, 等. 基于CNN CBAMBiGRU Attention的加密恶意流量识别[J].计算机工程, 2023, 49(11): 178186[8]Hinton G. Distilling the knowledge in a neural network[J]. arXiv preprint, arXiv:1503.02531, 2015[9]Liu Z, Mao H, Wu C Y, et al. A convnet for the 2020s[C] Proc of the IEEECVF Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2022: 1197611986[10]Li X, Wang W, Hu X, et al. Selective kernel networks[C] Proc of the IEEECVF Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2019: 510519[11]Shazeer N. Glu variants improve transformer[J]. arXiv preprint, arXiv:2002.05202, 2020[12]Sandler M, Howard A, Zhu M, et al. Mobilenetv2: Inverted residuals and linear bottlenecks[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2018: 45104520[13]Gil G D, Lashkari A H, Mamun M, et al. Characterization of encrypted and VPN traffic using timerelated features[C] Proc of the 2nd Int Conf on Information Systems Security and Privacy. Setúbal, Portugal: SciTePress, 2016: 407414[14]王伟. 基于深度学习的网络流量分类及异常检测方法研究[D]. 合肥: 中国科学技术大学, 2018[15]Longadge R, Dongre S. Class imbalance problem in data mining review[J]. arXiv preprint, arXiv:1305.1707, |