Research Article

Website Fingerprinting Attacks Based on Homology Analysis

Algorithm 2

Time interval symbolization algorithm.
Input: Packets Sequence , Number of symbols , Max Time interval ,
Output: Time interval symbol sequences
Steps:
(1)
(2)
(3)for packet do
(4)
(5)ifthen
(6)
(7)else
(8)
(9)end if
(10)
(11)
(12)end for
(13)return