Search

Your search keyword '"encrypted traffic"' showing total 195 results

Search Constraints

Start Over You searched for: Descriptor "encrypted traffic" Remove constraint Descriptor: "encrypted traffic"
195 results on '"encrypted traffic"'

Search Results

2. L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic Identification.

3. STC-BERT (Satellite Traffic Classification-BERT): A Traffic Classification Model for Low-Earth-Orbit Satellite Internet Systems.

4. Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction.

5. Encrypted traffic identification scheme based on sliding window and randomness features

6. ITC-Net-blend-60: a comprehensive dataset for robust network traffic classification in diverse environments

7. 基于滑动窗口和随机性特征的加密流量识别方案.

8. Streaming traffic classification: a hybrid deep learning and big data approach.

9. Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network.

10. Encrypted malware detection methodology without decryption using deep learning-based approaches.

11. ITC-Net-blend-60: a comprehensive dataset for robust network traffic classification in diverse environments.

12. Deep Learning-Based Anomaly Detection in TLS Encrypted Traffic

14. FSAM Framework for Online CDN-Based Website Classification

15. Improvising Encrypted Traffic Analysis Using Stacking Ensemble Model

17. Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis.

18. FedETC: Encrypted traffic classification based on federated learning

19. Active-Darknet: An Iterative Learning Approach for Darknet Traffic Detection and Categorization

20. AP-EH: An Encryption Hopping Method Based on Action Program Enabled SDN

21. F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android

22. Explainable Deep-Learning Approaches for Packet-Level Traffic Prediction of Collaboration and Communication Mobile Apps

23. MVDet: Encrypted malware traffic detection via multi-view analysis.

24. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.

25. F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android.

27. TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism.

28. Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis

29. CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection.

30. CBS: A Deep Learning Approach for Encrypted Traffic Classification With Mixed Spatio-Temporal and Statistical Features

31. Detection of Android Malware Based on Deep Forest and Feature Enhancement

32. Encrypted traffic classification method based on convolutional neural network

33. Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms

34. VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network

35. DTLF: Deep Transfer Learning for Website Fingerprinting

37. MEMTD: Encrypted Malware Traffic Detection Using Multimodal Deep Learning

38. Encrypted Malicious Traffic Detection Based on Ensemble Learning

39. A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic.

40. Dark-Forest: Analysis on the Behavior of Dark Web Traffic via DeepForest and PSO Algorithm.

41. Botnet Detection Model in Encrypted Traffics Software-Defined Network (SDN) Using Deep Neural Network (DNN).

42. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review

43. Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms.

44. 基于卷积神经网络的加密流量分类方法.

45. A novel approach for classification of Tor and non-Tor traffic using efficient feature selection methods.

46. Multi-scene Classification of Blockchain Encrypted Traffic

47. Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features

48. Fast Application Activity Recognition with Encrypted Traffic

49. Dual Generative Adversarial Networks Based Unknown Encryption Ransomware Attack Detection

50. CESNET-QUIC22: A large one-month QUIC network traffic dataset from backbone lines

Catalog

Books, media, physical & digital resources