Page 483 - 《软件学报》2025年第7期
P. 483
3404 软件学报 2025 年第 36 卷第 7 期
IEEE Int’l Workshop on Multimedia Signal Processing. Tampere: IEEE, 2020. 1–6. [doi: 10.1109/MMSP48831.2020.9287117]
[29] Behravesh R, Rao A, Perez-Ramirez DF, Harutyunyan D, Riggio R, Boman M. Machine learning at the mobile edge: The case of
dynamic adaptive streaming over HTTP (DASH). IEEE Trans. on Network and Service Management, 2022, 19(4): 4779–4793. [doi: 10.
1109/TNSM.2022.3193856]
[30] Yu L, Tillo T, Xiao JM. QoE-driven dynamic adaptive video streaming strategy with future information. IEEE Trans. on Broadcasting,
2017, 63(3): 523–534. [doi: 10.1109/TBC.2017.2687698]
[31] ISO/IEC 23009–6: 2017 Information technology—Dynamic adaptive streaming over HTTP (DASH)—Part 6: DASH with server push
and WebSockets. 2024. https://www.iso.org/standard/71072.html
[32] Comparison of the usage statistics of HTTP/2 for websites. 2024. https://w3techs.com/technologies/comparison/ce-http2
[33] Chaudhary S, Shukla NK, Chakraborty S, Maity M. A dataset for analyzing streaming media performance over HTTP/3 browsers. In:
Proc. of the 37th Int’l Conf. on Neural Information Processing Systems. New Orleans: Curran Associates Inc., 2024. 78069–78081.
[34] Wijnants M, Marx R, Quax P, Lamotte W. HTTP/2 prioritization and its impact on Web performance. In: Proc. of the 2018 World Wide
Web Conf. Lyon: Int’l World Wide Web Conferences Steering Committee, 2018. 1755–1764. [doi: 10.1145/3178876.3186181]
[35] Belshe M, Peon R, Thomson M. Hypertext transfer protocol version 2 (HTTP/2). RFC 7540, Internet Engineering Task Force, 2015. [doi:
10.17487/RFC7540]
[36] Yang LM, Fu SJ, Luo YC, Wang YJ, Zhao WT. A clustering method of encrypted video traffic based on Levenshtein distance. In: Proc.
of the 17th Int’l Conf. on Mobility, Sensing and Networking. Exeter: IEEE, 2021. 1–8. [doi: 10.1109/MSN53354.2021.00017]
[37] Schuster R, Shmatikov V, Tromer E. Beauty and the burst: Remote identification of encrypted video streams. In: Proc. of the 26th
USENIX Conf. on Security Symp. Vancouver: USENIX Association, 2017. 1357–1374.
[38] ISO/IEC 23009-8: 2022 Information technology—Dynamic adaptive streaming over HTTP (DASH)—Part 8: Session-based DASH
operations. 2024. https://www.iso.org/standard/80898.html
[39] Transport Layer Security (tls). 2018. https://datatracker.ietf.org/wg/tls/about/
[40] Zou FT, Yu TD, Xu WL. Encrypted malicious traffic detection based on hidden Markov model. Ruan Jian Xue Bao/Journal of Software,
2022, 33(7): 2683–2698 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6282.htm [doi: 10.13328/j.cnki.jos.006282]
附中文参考文献:
[22] 吴桦, 于振华, 程光, 胡晓艳. 大型指纹库场景中加密视频识别方法. 软件学报, 2021, 32(10): 3310–3330. http://www.jos.org.cn/1000-
9825/6025.htm [doi: 10.13328/j.cnki.jos.006025]
[40] 邹福泰, 俞汤达, 许文亮. 基于隐马尔可夫模型的加密恶意流量检测. 软件学报, 2022, 33(7): 2683–2698. http://www.jos.org.cn/1000-
9825/6282.htm [doi: 10.13328/j.cnki.jos.006282]
吴桦(1973-), 女, 博士, 副教授, 博士生导师, 刘嵩涛(1998-), 男, 硕士生, 主要研究领域为机
CCF 专业会员, 主要研究领域为加密流量分析, 器学习, 加密流量分类.
网络空间安全, 网络态势感知.
罗浩(1998-), 男, 硕士生, 主要研究领域为加密 程光(1973-), 男, 博士, 教授, 博士生导师, CCF
流量分析, 加密视频识别. 杰出会员, 主要研究领域为网络空间安全监测与
防护, 网络流量大数据分析, 僵尸网络, APT 攻
击检测.
赵士顺(2001-), 男, 硕士生, 主要研究领域为加 胡晓艳(1985-), 女, 博士, 副教授, 博士生导师,
密流量分析, 加密视频识别. CCF 专业会员, 主要研究领域为加密流量分析,
网络空间安全, 未来网络体系结构.

