[1] MALWARETIPS. Desk Top Browser Share Trend[EB/OL].[2016-04-15]. https: //malwaretips. com/threads/desktop-top-browser-share-trend. 5543/.
[2] STATCOUNTER . Top 5 Desktop Browsers from Jan to Dec 2015[EB/OL].[2016-04-15]. http: //gs. statcounter. com/#desktop-browser-ww-monthly-201501-201512-bar.
[3] ECKERSLEY P. How Unique Is Your Web Browser?[C]//Lecture Notes in Computer Science: 6205. Heidelberg: Springer Verlag, 2010: 1-18.
[4] NIKIFORAKIS N, KAPRAVELOS A, JOOSEN W, et al. Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting[C]//Proceedings of the IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2013: 541-555.
[5] 王维, 王伟平, 王建新. 一种基于升级浏览器指纹的用户识别方法[C]//第七届信息安全漏洞分析与风险评估大会论文集, 2014: 189-197.
[6] SUN Q, SIMON D R, WANG Y M, et al. Statistical Identification of Encrypted Web Browsing Traffic[C]//Proceedings of the IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2002: 19-30.
[7] SHI Y, BISWAS S. Website Fingerprinting Using Traffic Analysis of Dynamic Webpages[C]//Proceedings of the 2014 IEEE Global Communications Conference. Piscataway: IEEE, 2015: 557-563.
[8] YUAN Z L, XUE Y B, XIA W. PPI: towards Precise Page Identification for Encrypted Web-browsing Traffic[C]//Proceedings of the 9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. Piscataway: IEEE, 2013: 109-110.
[9] GONG X, BORISOV N, KIYAVASH N, et al. Website Detection Using Remote Traffic Analysis[C]//Lecture Notes in Computer Science: 7384.Heidelberg: Springer Verlag, 2012: 58-78.
[10] YU J, CHAN-TIN E. Identifying Webbrowsers in Encrypted Communications[C]//Proceedings of the ACM Conference on Computer and Communications Security. New York: ACM, 2014: 135-138.
[11] 柏骏, 夏靖波, 钟赟, 等. 网络运行态势感知技术及其模型[J]. 解放军理工大学学报: 自然科学版, 2015, 16(1): 16-22.
BAI Jun, XIA jingbo, ZHONG Yun, et al. Network Runing Situation Awareness Technology and Its Model[J]. Journal of PLA University of Science and Technology: Natural Science Edition, 2015, 16(1): 16-22
[12] 杨洁, 刘聪锋. 模式匹配与校验和相结合的IP协议识别方法[J]. 西安电子科技大学学报, 2012, 39(3): 149-153.
YANG Jie, LIU Congfeng. IP Protocol Identification Method Using the Pattern Match and Check Sum[J]. Journal of Xidian University, 2012, 39(3): 149-153.
[13] HECKERMAN D. A Tutorial on Learning with Bayesian Networks[C]//Learning in Graphical Models. Cambridge: MIT Press, 1999: 301-354.
[14] BREIMAN L. Random Forests[J]. Machine Learning, 2001, 45(1): 5-32.
[15] CHAU M, CHEN H C. A Maching Learning Approach to Web Page Filtering Using Content and Structure Analysis[J]. Decision Support System, 2008, 44(2): 482-494.
[16] ALEXA. The Top 500 Sites on the Web[EB/OL]. [2016-04-20]. http: //www. alexa. com/topsites. |