Journal articles on the topic 'Analysis and filtering of network traffic'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Analysis and filtering of network traffic.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rajaboevich, Gulomov Sherzod. "Comparative Analysis of Methods Content Filtering Network Traffic." International Journal of Emerging Trends in Engineering Research 8, no. 5 (May 25, 2020): 1561–69. http://dx.doi.org/10.30534/ijeter/2020/15852020.
Full textKabala, Piotr, and Dariusz Laskowski. "Analysis of Network Traffic Filtering / Analiza Filtracji Ruchu Sieciowego." Journal of KONBiN 33, no. 1 (September 1, 2015): 41–60. http://dx.doi.org/10.1515/jok-2015-0004.
Full textLu, Yao, Hanhong Jiang, Tao Liao, Chengcheng Xu, and Chen Deng. "Characteristic Analysis and Modeling of Network Traffic for the Electromagnetic Launch System." Mathematical Problems in Engineering 2019 (June 23, 2019): 1–7. http://dx.doi.org/10.1155/2019/2929457.
Full textNovakov, Stevan, Chung-Horng Lung, Ioannis Lambadaris, and Nabil Seddigh. "A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection." International Journal of Mobile Computing and Multimedia Communications 6, no. 1 (January 2014): 17–53. http://dx.doi.org/10.4018/ijmcmc.2014010102.
Full textLee, Jae-Kook, Taeyoung Hong, and Guohua Li. "Traffic and overhead analysis of applied pre-filtering ACL firewall on HPC service network." Journal of Communications and Networks 23, no. 3 (June 2021): 192–200. http://dx.doi.org/10.23919/jcn.2021.000011.
Full textPrivalov, Andrey, Vera Lukicheva, Igor Kotenko, and Igor Saenko. "Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering." Energies 12, no. 24 (December 13, 2019): 4768. http://dx.doi.org/10.3390/en12244768.
Full textFernández, Diego, Francisco J. Nóvoa, Fidel Cacheda, and Víctor Carneiro. "Advancing Network Flow Information Using Collaborative Filtering." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 25, Suppl. 2 (December 2017): 97–112. http://dx.doi.org/10.1142/s021848851740013x.
Full textJain, Sakshi, Mobin Javed, and Vern Paxson. "Towards Mining Latent Client Identifiers from Network Traffic." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (April 1, 2016): 100–114. http://dx.doi.org/10.1515/popets-2016-0007.
Full textshabtai, Asaf, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, and Yuval Elovici. "Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content." Security and Communication Networks 4, no. 8 (July 26, 2010): 947–65. http://dx.doi.org/10.1002/sec.229.
Full textTian, Zhao, Wei She, Shuang Li, You-Wei Wang, Wei Liu, Guang-Jun Zai, Li-Min Jia, Yong Qin, and Hong-Hui Dong. "Key links identification for urban road traffic network based on temporal-spatial distribution of traffic congestion." Modern Physics Letters B 33, no. 25 (September 10, 2019): 1950307. http://dx.doi.org/10.1142/s021798491950307x.
Full textKumar, Dr T. Senthil. "Video based Traffic Forecasting using Convolution Neural Network Model and Transfer Learning Techniques." Journal of Innovative Image Processing 2, no. 3 (June 17, 2020): 128–34. http://dx.doi.org/10.36548/jiip.2020.3.002.
Full textWang, Hong Chun, and Wen Sheng Niu. "Design and Analysis of AFDX Network Based High-Speed Avionics System of Civil Aircraft." Advanced Materials Research 462 (February 2012): 445–51. http://dx.doi.org/10.4028/www.scientific.net/amr.462.445.
Full textMorzhov, Sergey V., and Valeriy A. Sokolov. "An Effective Algorithm for Collision Resolution in Security Policy Rules." Modeling and Analysis of Information Systems 26, no. 1 (March 15, 2019): 75–89. http://dx.doi.org/10.18255/1818-1015-2019-1-75-89.
Full textMelkov, Dmitrij, and Šarūnas Paulikas. "ANALYSIS OF LINUX OS SECURITY TOOLS FOR PACKET FILTERING AND PROCESSING." Mokslas - Lietuvos ateitis 13 (August 24, 2021): 1–5. http://dx.doi.org/10.3846/mla.2021.15180.
Full textMalekzadeh, Mina, Abdul Azim Abdul Ghani, and Shamala Subramaniam. "Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/218271.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full textNahar, Nivedita, Prerna Dewan, and Rakesh Kumar. "An Approach to Mitigate Malware Attacks Using Netfilter's Hybrid Frame in Firewall Security." International Journal of Open Source Software and Processes 9, no. 1 (January 2018): 32–61. http://dx.doi.org/10.4018/ijossp.2018010103.
Full textHan, Zhen-Hui, Xing-Shu Chen, Xue-Mei Zeng, Yi Zhu, and Ming-Yong Yin. "Detecting Proxy User Based on Communication Behavior Portrait." Computer Journal 62, no. 12 (August 15, 2019): 1777–92. http://dx.doi.org/10.1093/comjnl/bxz065.
Full textHuang, Yuanyuan, Lu Jiazhong, Haozhe Tang, and Xiaolei Liu. "A Hybrid Association Rule-Based Method to Detect and Classify Botnets." Security and Communication Networks 2021 (September 16, 2021): 1–9. http://dx.doi.org/10.1155/2021/1028878.
Full textHajamydeen, Asif Iqbal, and Nur Izura Udzir. "A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 113–60. http://dx.doi.org/10.12694/scpe.v20i1.1465.
Full textPrivalov, Andrey, Vera Lukicheva, Igor Kotenko, and Igor Saenko. "Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering." Energies 13, no. 11 (June 1, 2020): 2774. http://dx.doi.org/10.3390/en13112774.
Full textDhaya, R. "Construction of reliable image captioning system for web camera based traffic analysis on road transport application." June 2021 3, no. 2 (July 17, 2021): 114–30. http://dx.doi.org/10.36548/jtcsst.2021.2.004.
Full textPavlyuk. "Transfer Learning: Video Prediction and Spatiotemporal Urban Traffic Forecasting." Algorithms 13, no. 2 (February 13, 2020): 39. http://dx.doi.org/10.3390/a13020039.
Full textNie, Yunhui. "Integrated Management System for Coal Mine Locomotive Transportation." Electronics Science Technology and Application 7, no. 4 (January 21, 2021): 109. http://dx.doi.org/10.18686/esta.v7i4.165.
Full textMukhtar, Shaika, and Gh Rasool Begh. "Performance Analysis of Filtered OFDM Based Downlink and Uplink NOMA System over Nakagami-m Fading Channel." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 11–23. http://dx.doi.org/10.26636/jtit.2021.148020.
Full textVan Der Zijpp, Nanne J. "Dynamic Origin-Destination Matrix Estimation from Traffic Counts and Automated Vehicle Identification Data." Transportation Research Record: Journal of the Transportation Research Board 1607, no. 1 (January 1997): 87–94. http://dx.doi.org/10.3141/1607-13.
Full textAntoniou, I., Vi V. Ivanov, Va V. Ivanov, and P. V. Zrelov. "Wavelet filtering of network traffic measurements." Physica A: Statistical Mechanics and its Applications 324, no. 3-4 (June 2003): 733–53. http://dx.doi.org/10.1016/s0378-4371(03)00062-1.
Full textRui, Li, Xie Xiaoyu, and Duan Xueyan. "Fatigue Load Spectrum of Highway Bridge Vehicles in Plateau Mountainous Area Based on Wireless Sensing." Mobile Information Systems 2021 (April 26, 2021): 1–8. http://dx.doi.org/10.1155/2021/9955988.
Full textBaiocchi, Andrea, Gianluca Maiolini, Annachiara Mingo, and Daniele Goretti. "Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices." Journal of Computer Networks and Communications 2015 (2015): 1–17. http://dx.doi.org/10.1155/2015/872326.
Full textBoranbayev, S., and D. Kuanyshev. "NETWORK TRAFFIC ANALYSIS TOOLS." EurasianUnionScientists 5, no. 12(81) (January 18, 2021): 35–38. http://dx.doi.org/10.31618/esu.2413-9335.2020.5.81.1171.
Full textChemouil, P., and J. Filipiak. "Kalman Filtering of Traffic Fluctuations for Real-Time Network Management." IFAC Proceedings Volumes 20, no. 9 (August 1987): 827–32. http://dx.doi.org/10.1016/s1474-6670(17)55811-5.
Full textZuurbier, Frank, Hans van Lint, and Victor Knoop. "TRAFFIC NETWORK STATE ESTIMATION USING EXTENDED KALMAN FILTERING AND DSMART." IFAC Proceedings Volumes 39, no. 12 (January 2006): 37–42. http://dx.doi.org/10.3182/20060829-3-nl-2908.00007.
Full textChemouil, Prosper, and Janusz Filipiak. "Kalman filtering of traffic fluctuations for real-time network management." Annales Des Télécommunications 44, no. 11-12 (November 1989): 633–40. http://dx.doi.org/10.1007/bf02999677.
Full textMarinescu, Marin, Radu Vilau, Marian Truta, Valentin Vinturis, and Octavian Fieraru. "Theoretical and Data-Based Mathematical Model of a Special Vehicle Breaking System." Advanced Materials Research 837 (November 2013): 428–33. http://dx.doi.org/10.4028/www.scientific.net/amr.837.428.
Full textAkritas, P., P. G. Akishin, I. Antoniou, A. Yu Bonushkina, I. Drossinos, V. V. Ivanov, Yu L. Kalinovsky, V. V. Korenkov, and P. V. Zrelov. "Nonlinear analysis of network traffic." Chaos, Solitons & Fractals 14, no. 4 (September 2002): 595–606. http://dx.doi.org/10.1016/s0960-0779(01)00253-3.
Full textIslam, Rafiqul, Wanlei Zhou, Yang Xiang, and Abdun Naser Mahmood. "Spam filtering for network traffic security on a multi-core environment." Concurrency and Computation: Practice and Experience 21, no. 10 (July 2009): 1307–20. http://dx.doi.org/10.1002/cpe.1435.
Full textSalva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, and Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks." Security and Communication Networks 2018 (December 10, 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.
Full textWang, Jian Ling, and Hong Bo Lai. "Congestion Analysis on Urban Traffic Network." Advanced Materials Research 756-759 (September 2013): 1635–38. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1635.
Full textFatkieva, Rosa Ravilievna. "Correlation analysis of abnormal network traffic." SPIIRAS Proceedings 4, no. 23 (March 17, 2014): 93. http://dx.doi.org/10.15622/sp.23.5.
Full textHusni. "Spektral Analysis of Honeypot Network Traffic." SPIIRAS Proceedings, no. 7 (March 17, 2014): 177. http://dx.doi.org/10.15622/sp.7.17.
Full textAyedemir, M., L. Bottomley, M. Coffin, C. Jeffries, P. Kiessler, K. Kumar, W. Ligon, et al. "Two tools for network traffic analysis." Computer Networks 36, no. 2-3 (July 2001): 169–79. http://dx.doi.org/10.1016/s1389-1286(00)00188-2.
Full textSang, Aimin, and San-qi Li. "A predictability analysis of network traffic." Computer Networks 39, no. 4 (July 2002): 329–45. http://dx.doi.org/10.1016/s1389-1286(01)00304-8.
Full textLakhina, Anukool, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D. Kolaczyk, and Nina Taft. "Structural analysis of network traffic flows." ACM SIGMETRICS Performance Evaluation Review 32, no. 1 (June 2004): 61–72. http://dx.doi.org/10.1145/1012888.1005697.
Full textDinh Dang, Trang, Sándor Molnár, and István Maricza. "Performance analysis of multifractal network traffic." European Transactions on Telecommunications 15, no. 2 (March 2004): 63–78. http://dx.doi.org/10.1002/ett.955.
Full textMiao, Yuantian, Zichan Ruan, Lei Pan, Jun Zhang, and Yang Xiang. "Comprehensive analysis of network traffic data." Concurrency and Computation: Practice and Experience 30, no. 5 (July 7, 2017): e4181. http://dx.doi.org/10.1002/cpe.4181.
Full textShin, Seon-Ho, and Myungkeun Yoon. "Virtual vectors and network traffic analysis." IEEE Network 26, no. 1 (January 2012): 22–26. http://dx.doi.org/10.1109/mnet.2012.6135852.
Full textFotiadou, Konstantina, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, and Theodore Zahariadis. "Network Traffic Anomaly Detection via Deep Learning." Information 12, no. 5 (May 19, 2021): 215. http://dx.doi.org/10.3390/info12050215.
Full textGazis, Denos, and Chiu Liu. "Kalman filtering estimation of traffic counts for two network links in tandem." Transportation Research Part B: Methodological 37, no. 8 (September 2003): 737–45. http://dx.doi.org/10.1016/s0191-2615(02)00059-0.
Full textZilberman, Polina, Rami Puzis, and Yuval Elovici. "On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers." IEEE Transactions on Dependable and Secure Computing 14, no. 5 (September 1, 2017): 521–34. http://dx.doi.org/10.1109/tdsc.2015.2494039.
Full textDeng, Jing, Richard Han, and Shivakant Mishra. "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks." Pervasive and Mobile Computing 2, no. 2 (April 2006): 159–86. http://dx.doi.org/10.1016/j.pmcj.2005.12.003.
Full text