Journal articles on the topic 'Network traffic detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network traffic detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Praveena, Nutakki, Dr Ujwal A. Lanjewar, and Chilakalapudi Meher Babu. "VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 1 (June 23, 2013): 29–34. http://dx.doi.org/10.24297/ijct.v5i1.4383.
Full textPratomo, Baskoro A., Pete Burnap, and George Theodorakopoulos. "BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks." Security and Communication Networks 2020 (August 4, 2020): 1–15. http://dx.doi.org/10.1155/2020/8826038.
Full textJiang, Ding De, Cheng Yao, Zheng Zheng Xu, Peng Zhang, Zhen Yuan, and Wen Da Qin. "An Continuous Wavelet Transform-Based Detection Approach to Traffic Anomalies." Applied Mechanics and Materials 130-134 (October 2011): 2098–102. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2098.
Full textAnwer, M., S. M. Khan, M. U. Farooq, and W. Waseemullah. "Attack Detection in IoT using Machine Learning." Engineering, Technology & Applied Science Research 11, no. 3 (June 12, 2021): 7273–78. http://dx.doi.org/10.48084/etasr.4202.
Full textFotiadou, Konstantina, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, and Theodore Zahariadis. "Network Traffic Anomaly Detection via Deep Learning." Information 12, no. 5 (May 19, 2021): 215. http://dx.doi.org/10.3390/info12050215.
Full textLu, Jiazhong, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, and Wei Deng. "Integrating Traffics with Network Device Logs for Anomaly Detection." Security and Communication Networks 2019 (June 13, 2019): 1–10. http://dx.doi.org/10.1155/2019/5695021.
Full textAli, Wasim Ahmed, Manasa K. N, Mohammed Aljunid, Malika Bendechache, and P. Sandhya. "Review of Current Machine Learning Approaches for Anomaly Detection in Network Traffic." Journal of Telecommunications and the Digital Economy 8, no. 4 (December 2, 2020): 64–95. http://dx.doi.org/10.18080/jtde.v8n4.307.
Full textBarrionuevo, Mercedes, Mariela Lopresti, Natalia Miranda, and Fabiana Piccoli. "Secure Computer Network: Strategies and Challengers in Big Data Era." Journal of Computer Science and Technology 18, no. 03 (December 12, 2018): e28. http://dx.doi.org/10.24215/16666038.18.e28.
Full textLalitha, K. V., and V. R. Josna. "Traffic Verification for Network Anomaly Detection in Sensor Networks." Procedia Technology 24 (2016): 1400–1405. http://dx.doi.org/10.1016/j.protcy.2016.05.161.
Full textMeimei Ding and Hui Tian. "PCA-based network Traffic anomaly detection." Tsinghua Science and Technology 21, no. 5 (October 2016): 500–509. http://dx.doi.org/10.1109/tst.2016.7590319.
Full textTian, Hui, Jingtian Liu, and Meimei Ding. "Promising techniques for anomaly detection on network traffic." Computer Science and Information Systems 14, no. 3 (2017): 597–609. http://dx.doi.org/10.2298/csis170201018h.
Full textNguyen, Hoanh. "Fast Traffic Sign Detection Approach Based on Lightweight Network and Multilayer Proposal Network." Journal of Sensors 2020 (June 19, 2020): 1–13. http://dx.doi.org/10.1155/2020/8844348.
Full textTao, Xiaoling, Yang Peng, Feng Zhao, Peichao Zhao, and Yong Wang. "A parallel algorithm for network traffic anomaly detection based on Isolation Forest." International Journal of Distributed Sensor Networks 14, no. 11 (November 2018): 155014771881447. http://dx.doi.org/10.1177/1550147718814471.
Full textGao, Minghui, Li Ma, Heng Liu, Zhijun Zhang, Zhiyan Ning, and Jian Xu. "Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis." Sensors 20, no. 5 (March 6, 2020): 1452. http://dx.doi.org/10.3390/s20051452.
Full textAbuadlla, Yousef, Goran Kvascev, Slavko Gajin, and Zoran Jovanovic. "Flow-based anomaly intrusion detection system using two neural network stages." Computer Science and Information Systems 11, no. 2 (2014): 601–22. http://dx.doi.org/10.2298/csis130415035a.
Full textZHONG, SHI, TAGHI M. KHOSHGOFTAAR, and NAEEM SELIYA. "CLUSTERING-BASED NETWORK INTRUSION DETECTION." International Journal of Reliability, Quality and Safety Engineering 14, no. 02 (April 2007): 169–87. http://dx.doi.org/10.1142/s0218539307002568.
Full textYeh, Tien-Wen, Huei-Yung Lin, and Chin-Chen Chang. "Traffic Light and Arrow Signal Recognition Based on a Unified Network." Applied Sciences 11, no. 17 (August 31, 2021): 8066. http://dx.doi.org/10.3390/app11178066.
Full textHu, Qinwen, Muhammad Rizwan Asghar, and Nevil Brownlee. "Effectiveness of Intrusion Detection Systems in High-speed Networks." International Journal of Information, Communication Technology and Applications 4, no. 1 (March 18, 2018): 1–10. http://dx.doi.org/10.17972/ijicta20184138.
Full textMiller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (July 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.
Full textLi, Ming, Dezhi Han, Xinming Yin, Han Liu, and Dun Li. "Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features." Security and Communication Networks 2021 (August 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/7045823.
Full textDo, ChoXuan, Nguyen Quang Dam, and Nguyen Tung Lam. "Optimization of network traffic anomaly detection using machine learning." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (June 1, 2021): 2360. http://dx.doi.org/10.11591/ijece.v11i3.pp2360-2370.
Full textSafar, Noor Zuraidin Mohd, Noryusliza Abdullah, Hazalila Kamaludin, Suhaimi Abd Ishak, and Mohd Rizal Mohd Isa. "Characterising and detection of botnet in P2P network for UDP protocol." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (June 1, 2020): 1584. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1584-1595.
Full textNaseer, Sheraz, Rao Faizan Ali, P. D. D. Dominic, and Yasir Saleem. "Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures." Symmetry 12, no. 11 (November 16, 2020): 1882. http://dx.doi.org/10.3390/sym12111882.
Full textZhu, Xia, Weidong Song, and Lin Gao. "Regional Patch Detection of Road Traffic Network." Journal of Sensors 2020 (June 2, 2020): 1–6. http://dx.doi.org/10.1155/2020/6836091.
Full textPoonkavithai, K., and A. Keerthika. "Unreliable Road Network Traffic Detection and Prevention." International Journal of u- and e-Service, Science and Technology 8, no. 5 (May 31, 2015): 13–22. http://dx.doi.org/10.14257/ijunesst.2015.8.5.02.
Full textThomas, Ciza. "Improving intrusion detection for imbalanced network traffic." Security and Communication Networks 6, no. 3 (July 10, 2012): 309–24. http://dx.doi.org/10.1002/sec.564.
Full textParres-Peredo, Alvaro, Ivan Piza-Davila, and Francisco Cervantes. "Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity." Applied Sciences 9, no. 20 (October 17, 2019): 4381. http://dx.doi.org/10.3390/app9204381.
Full textRajaboevich, Gulomov Sherzod, and Ganiev Abdukhalil Abdujalilovich. "Methods and models of protecting computer networks from un-wanted network traffic." International Journal of Engineering & Technology 7, no. 4 (September 24, 2018): 2541. http://dx.doi.org/10.14419/ijet.v7i4.14744.
Full textNie, Laisen, Dingde Jiang, and Zhihan Lv. "Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks." Annals of Telecommunications 72, no. 5-6 (October 13, 2016): 297–305. http://dx.doi.org/10.1007/s12243-016-0546-3.
Full textAlgelal, Zahraa M., Eman Abdulaziz Ghani Aldhaher, Dalia N. Abdul-Wadood, and Radhwan Hussein Abdulzhraa Al-Sagheer. "Botnet detection using ensemble classifiers of network flow." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 2543. http://dx.doi.org/10.11591/ijece.v10i3.pp2543-2550.
Full textDemertzis, Konstantinos, Konstantinos Tsiknas, Dimitrios Takezis, Charalabos Skianis, and Lazaros Iliadis. "Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework." Electronics 10, no. 7 (March 25, 2021): 781. http://dx.doi.org/10.3390/electronics10070781.
Full textKim, Hyun-Koo, Kook-Yeol Yoo, Ju H. Park, and Ho-Youl Jung. "Traffic Light Recognition Based on Binary Semantic Segmentation Network." Sensors 19, no. 7 (April 10, 2019): 1700. http://dx.doi.org/10.3390/s19071700.
Full textPatel, Darsh, Kathiravan Srinivasan, Chuan-Yu Chang, Takshi Gupta, and Aman Kataria. "Network Anomaly Detection inside Consumer Networks—A Hybrid Approach." Electronics 9, no. 6 (June 1, 2020): 923. http://dx.doi.org/10.3390/electronics9060923.
Full textDymora, Paweł, Miroslaw Mazurek, and Sławomir Jaskółka. "VoIP Anomaly Detection - selected methods of statistical analysis." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (December 22, 2017): 14. http://dx.doi.org/10.17951/ai.2016.16.2.14.
Full textQu, Yanyu, Fangling Pu, Jianguo Yin, Lingzi Liu, and Xin Xu. "Dynamic Traffic Detection and Modeling for Beidou Satellite Networks." Journal of Sensors 2020 (January 22, 2020): 1–11. http://dx.doi.org/10.1155/2020/4575721.
Full textLu, Liang Fu, Zheng-Hai Huang, Mohammed A. Ambusaidi, and Kui-Xiang Gou. "A Large-Scale Network Data Analysis via Sparse and Low Rank Reconstruction." Discrete Dynamics in Nature and Society 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/323764.
Full textOujezsky, Vaclav, Tomas Horvath, and Vladislav Skorpil. "Botnet C&C Traffic and Flow Lifespans Using Survival Analysis." International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems 6, no. 1 (March 27, 2017): 38. http://dx.doi.org/10.11601/ijates.v6i1.205.
Full textWei, Songjie, Zedong Zhang, Shasha Li, and Pengfei Jiang. "Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection." Security and Communication Networks 2021 (February 26, 2021): 1–10. http://dx.doi.org/10.1155/2021/6695858.
Full textMažeika, Dalius, and Saulius Jasonis. "NETWORK TRAFFIC ANOMALIES DETECTING USING MAXIMUM ENTROPY METHOD / KOMPIUTERIŲ TINKLO SRAUTO ANOMALIJŲ ATPAŽINIMAS MAKSIMALIOS ENTROPIJOS METODU." Mokslas – Lietuvos ateitis 6, no. 2 (April 24, 2014): 162–67. http://dx.doi.org/10.3846/mla.2014.22.
Full textDu, Chunlai, Shenghui Liu, Lei Si, Yanhui Guo, and Tong Jin. "Using Object Detection Network for Malware Detection and Identification in Network Traffic Packets." Computers, Materials & Continua 64, no. 3 (2020): 1785–96. http://dx.doi.org/10.32604/cmc.2020.010091.
Full textLin, Tu-Liang, and Hong-Yi Chang. "Black Hole Traffic Anomaly Detections in Wireless Sensor Network." International Journal of Grid and High Performance Computing 7, no. 1 (January 2015): 42–51. http://dx.doi.org/10.4018/ijghpc.2015010104.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textFadlil, Abdul, Imam Riadi, and Sukma Aji. "Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics." Bulletin of Electrical Engineering and Informatics 6, no. 2 (June 1, 2017): 140–48. http://dx.doi.org/10.11591/eei.v6i2.605.
Full textBai, Huiwen, Guangjie Liu, Weiwei Liu, Yingxue Quan, and Shuhua Huang. "N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection." Security and Communication Networks 2021 (April 23, 2021): 1–17. http://dx.doi.org/10.1155/2021/5599556.
Full textSaganowski, Łukasz, and Tomasz Andrysiak. "Snort IDS Hybrid ADS Preprocessor." Image Processing & Communications 17, no. 4 (December 1, 2012): 17–22. http://dx.doi.org/10.2478/v10248-012-0024-0.
Full textJiang, Jun, and Symeon Papavassiliou. "Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies." Computer Communications 29, no. 10 (June 2006): 1627–38. http://dx.doi.org/10.1016/j.comcom.2005.07.030.
Full textClausen, Henry, Gudmund Grov, and David Aspinall. "CBAM: A Contextual Model for Network Anomaly Detection." Computers 10, no. 6 (June 11, 2021): 79. http://dx.doi.org/10.3390/computers10060079.
Full textDymora, Paweł, and Mirosław Mazurek. "Anomaly Detection in IoT Communication Network Based on Spectral Analysis and Hurst Exponent." Applied Sciences 9, no. 24 (December 6, 2019): 5319. http://dx.doi.org/10.3390/app9245319.
Full textWu, Weiwei, Haoyu Zhang, Shengrun Zhang, and Frank Witlox. "Community Detection in Airline Networks: An Empirical Analysis of American vs. Southwest Airlines." Journal of Advanced Transportation 2019 (December 31, 2019): 1–11. http://dx.doi.org/10.1155/2019/3032015.
Full textDamasevicius, Robertas, Algimantas Venckauskas, Sarunas Grigaliunas, Jevgenijus Toldinas, Nerijus Morkevicius, Tautvydas Aleliunas, and Paulius Smuikys. "LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection." Electronics 9, no. 5 (May 13, 2020): 800. http://dx.doi.org/10.3390/electronics9050800.
Full text