Academic literature on the topic 'Network traffic detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network traffic detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network traffic detection"
Chadrack, Irabaruta, and Dr Nyesheja Muhire Enan. "AI Powered Network Traffic Detection." Journal of Information and Technology 5, no. 2 (2025): 53–65. https://doi.org/10.70619/vol5iss2pp53-65.
Full textKatuk, Norliza, Mohamad Sabri Sinal, Mohammed Gamal Ahmed Al-Samman, and Ijaz Ahmad. "An observational mechanism for detection of distributed denial-of-service attacks." International Journal of Advances in Applied Sciences 12, no. 2 (2023): 121. http://dx.doi.org/10.11591/ijaas.v12.i2.pp121-132.
Full textNorliza, Katuk, Gamal Ahmed Al-Samman Mohammed, and Ahmad Ijaz. "An observational mechanism for detection of distributed denial-of-service attacks." International Journal of Advances in Applied Sciences (IJAAS) 12, no. 2 (2023): 132. https://doi.org/10.11591/ijaas.v12.i2.pp121-132.
Full textJiang, Ding De, Cheng Yao, Zheng Zheng Xu, Peng Zhang, Zhen Yuan, and Wen Da Qin. "An Continuous Wavelet Transform-Based Detection Approach to Traffic Anomalies." Applied Mechanics and Materials 130-134 (October 2011): 2098–102. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2098.
Full textPraveena, Nutakki, Dr Ujwal A. Lanjewar, and Chilakalapudi Meher Babu. "VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 1 (2013): 29–34. http://dx.doi.org/10.24297/ijct.v5i1.4383.
Full textFu, Xingbing, Xuewen Zhang, Jianfeng Fu, Bingjin Wu, and Jianwu Zhang. "Deep metric learning based approach for network intrusion detection." Journal of Physics: Conference Series 2504, no. 1 (2023): 012037. http://dx.doi.org/10.1088/1742-6596/2504/1/012037.
Full textSon, Vu Ngoc. "Optimizing Network Anomaly Detection Based on Network Traffic." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 53–60. http://dx.doi.org/10.46338/ijetae1121_07.
Full textPratomo, Baskoro A., Pete Burnap, and George Theodorakopoulos. "BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks." Security and Communication Networks 2020 (August 4, 2020): 1–15. http://dx.doi.org/10.1155/2020/8826038.
Full textOh, Changhyeon, and Yuseok Ban. "Cross-Modality Interaction-Based Traffic Accident Classification." Applied Sciences 14, no. 5 (2024): 1958. http://dx.doi.org/10.3390/app14051958.
Full textZhiwei Zhang, Zhiwei Zhang, Guiyuan Tang Zhiwei Zhang, Baoquan Ren Guiyuan Tang, Baoquan Ren Baoquan Ren, and Yulong Shen Baoquan Ren. "TV-ADS: A Smarter Attack Detection Scheme Based on Traffic Visualization of Wireless Network Event Cell." 網際網路技術學刊 25, no. 2 (2024): 301–11. http://dx.doi.org/10.53106/160792642024032502012.
Full textDissertations / Theses on the topic "Network traffic detection"
Brauckhoff, Daniela. "Network traffic anomaly detection and evaluation." Aachen Shaker, 2010. http://d-nb.info/1001177746/04.
Full textUdd, Robert. "Anomaly Detection in SCADA Network Traffic." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122680.
Full textYellapragada, Ramani. "Probabilistic Model for Detecting Network Traffic Anomalies." Ohio University / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1088538020.
Full textZhang, Junjie. "Effective and scalable botnet detection in network traffic." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.
Full textBabaie, Tahereh Tara. "New Methods for Network Traffic Anomaly Detection." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/12032.
Full textVu, Hong Linh. "DNS Traffic Analysis for Network-based Malware Detection." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93842.
Full textDandurand, Luc. "Detection of network infrastructure attacks using artificial traffic." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq44906.pdf.
Full textGupta, Vikas. "File Detection in Network Traffic Using Approximate Matching." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22696.
Full textBrauckhoff, Daniela [Verfasser]. "Network Traffic Anomaly Detection and Evaluation / Daniela Brauckhoff." Aachen : Shaker, 2010. http://d-nb.info/1122546610/34.
Full textTaggart, Benjamin T. "Incorporating neural network traffic prediction into freeway incident detection." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=723.
Full textBooks on the topic "Network traffic detection"
Bhuyan, Monowar H., Dhruba K. Bhattacharyya, and Jugal K. Kalita. Network Traffic Anomaly Detection and Prevention. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65188-0.
Full textThancanamootoo, S. Automatic detection of traffic incidents on a signal-controlled road network. University of Newcastle upon Tyne, Transport Operations Research Group, 1988.
Find full textBiersack, Ernst. Data Traffic Monitoring and Analysis: From Measurement, Classification, and Anomaly Detection to Quality of Experience. Springer Berlin Heidelberg, 2013.
Find full textRajchel, Brett. Unsupervised Learning of Network Traffic Behaviors for Insider Threat Detection. Independently Published, 2021.
Find full textKalita, Jugal K., Monowar H. Bhuyan, and Dhruba K. Bhattacharyya. Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools. Springer, 2018.
Find full textKalita, Jugal K., Monowar H. Bhuyan, and Dhruba K. Bhattacharyya. Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools. Springer, 2017.
Find full textTari, Zahir, Adil Fahad, Abdulmohsen Almalawi, and Xun Yi. Network Classification for Traffic Management: Anomaly detection, feature selection, clustering and classification. Institution of Engineering and Technology, 2020. http://dx.doi.org/10.1049/pbpc032e.
Full textTari, Zahir, Adil Fahad, Abdulmohsen Almalawi, and Xun Yi. Network Classification for Traffic Management: Anomaly Detection, Feature Selection, Clustering and Classification. Institution of Engineering & Technology, 2020.
Find full textEngland, Highways. Design Manual for Roads and Bridges : Vol. 9 : Network - Traffic Control and Communications, Section 1 : Detection Technology, Part 2: Detection on the Motorway and Trunk Road Network. Stationery Office, The, 2017.
Find full textEngland, Highways. Design Manual for Roads and Bridges : Vol. 9 : Network - Traffic Control and Communications, Section 1 : Detection Technology, Part 2: Detection on the Motorway and Trunk Road Network Annex F. Stationery Office, The, 2018.
Find full textBook chapters on the topic "Network traffic detection"
Yao, Danfeng Daphne, Xiaokui Shu, Long Cheng, and Salvatore J. Stolfo. "Anomaly Detection on Network Traffic." In Anomaly Detection as a Service. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-031-02354-5_6.
Full textCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Detection of Anomalous Encrypted Traffic." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_4.
Full textCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Artificial Intelligence-Based Approaches for Anomaly Detection." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_5.
Full textLiu, ChenHuan, QianKun Liu, ShanShan Hao, CongXiao Bao, and Xing Li. "IPv6-Darknet Network Traffic Detection." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78612-0_19.
Full textKrzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Full textCui, Qian, Guy-Vincent Jourdan, Gregor V. Bochmann, and Iosif-Viorel Onut. "Proactive Detection of Phishing Kit Traffic." In Applied Cryptography and Network Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78375-4_11.
Full textColuccia, Angelo, Alessandro D’Alconzo, and Fabio Ricciato. "Distribution-Based Anomaly Detection in Network Traffic." In Data Traffic Monitoring and Analysis. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36784-7_9.
Full textWang, Hanyang, Sirui Zhou, Honglei Li, et al. "Deep Learning Network Intrusion Detection Based on Network Traffic." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06791-4_16.
Full textBialas, Andrzej, Marcin Michalak, and Barbara Flisiuk. "Anomaly Detection in Network Traffic Security Assurance." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19501-4_5.
Full textde la Puerta, José Gaviria, Iker Pastor-López, Borja Sanz, and Pablo G. Bringas. "Network Traffic Analysis for Android Malware Detection." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29859-3_40.
Full textConference papers on the topic "Network traffic detection"
Žada, Frane, and Martina Antonić. "Network Traffic Intrusion Detection." In 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2024. http://dx.doi.org/10.23919/softcom62040.2024.10721884.
Full textDeepika, D., Deepika Pogiri, Lokesh Raj Pandravisham, Yashwanth Kumar Prudvi, and Sathvik Reddy Ramannagari. "Anomaly Network Traffic Detection of Wireless Network System." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10689805.
Full textKorniszuk, Krzysztof, and Bartosz Sawicki. "Autoencoder-Based Anomaly Detection in Network Traffic." In 2024 25th International Conference on Computational Problems of Electrical Engineering (CPEE). IEEE, 2024. http://dx.doi.org/10.1109/cpee64152.2024.10720411.
Full textSharma, Jatin, Kanwarpartap Singh Gill, Deepak Upadhyay, and Swati Devliyal. "Revolutionizing Network Safety: Convolutional Neural Networks for Traffic Anomaly Detection." In 2024 Asian Conference on Intelligent Technologies (ACOIT). IEEE, 2024. https://doi.org/10.1109/acoit62457.2024.10939940.
Full textGu, Yonghao, Xiaoqing Zhang, Hao Xu, and Tiejun Wu. "DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00253.
Full textKoumar, Josef, Jaroslav Pesek, Kamil Jerabek, and Tomáš Čejka. "Towards Building Network Outlier Detection System for Network Traffic Monitoring." In NOMS 2025-2025 IEEE Network Operations and Management Symposium. IEEE, 2025. https://doi.org/10.1109/noms57970.2025.11073727.
Full textJerabek, Kamil, Josef Koumar, Jiří Setinský, and Jaroslav Pesek. "Explainable Anomaly Detection in Network Traffic Using LLM." In NOMS 2025-2025 IEEE Network Operations and Management Symposium. IEEE, 2025. https://doi.org/10.1109/noms57970.2025.11073574.
Full textLuo, Yongsheng. "Using Graph Neural Networks to Improve Network Traffic Anomaly Detection Performance." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2025. https://doi.org/10.1109/icdcece65353.2025.11035232.
Full textMiani, Rodrigo Sanches, Regina Melo Silveira, Rafael Pasquini, Luciana Arantes, and Pierre Sens. "Network Slice Monitoring System For Disaster Detection." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbrc.2025.6415.
Full textGoel, Avnish, Apoorv Kashyap, B. Devesha Reddy, Rochak Kaushik, S. Nagasundari, and Prasad B. Honnavali. "Detection of VPN Network Traffic." In 2022 IEEE Delhi Section Conference (DELCON). IEEE, 2022. http://dx.doi.org/10.1109/delcon54057.2022.9753621.
Full textReports on the topic "Network traffic detection"
De Lucia, Michael, Daniel Krych, Stephen Raio, and Jason Ellis. An Empirical Investigation of Packet Header-Only Network Traffic Anomaly Detection and Classification. DEVCOM Army Research Laboratory, 2023. http://dx.doi.org/10.21236/ad1194755.
Full textBardhan, Shuvo, Mitsuhiro Hatada, James Filliben, Douglas Montgomery, and Alexander Jia. An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.tn.2142.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textAlbrecht, Jochen, Andreas Petutschnig, Laxmi Ramasubramanian, Bernd Resch, and Aleisha Wright. Comparing Twitter and LODES Data for Detecting Commuter Mobility Patterns. Mineta Transportation Institute, 2021. http://dx.doi.org/10.31979/mti.2021.2037.
Full text