Research Article
Website Fingerprinting Attacks Based on Homology Analysis
Algorithm 2
Time interval symbolization algorithm.
Input: Packets Sequence , Number of symbols , Max Time interval , | Output: Time interval symbol sequences | Steps: | (1) | | (2) | | (3) | for packet do | (4) | | (5) | ifthen | (6) | | (7) | else | (8) | | (9) | end if | (10) | | (11) | | (12) | end for | (13) | return |
|