Two-phased method for identifying SSH encrypted application flows | IEEE Conference Publication | IEEE Xplore