Artículos de revistas sobre el tema "Analysis of encrypted network flow"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Analysis of encrypted network flow".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Yan, Xiaodan. "Deep Learning-Based Efficient Analysis for Encrypted Traffic". Applied Sciences 13, n.º 21 (27 de octubre de 2023): 11776. http://dx.doi.org/10.3390/app132111776.
Texto completoJiang, Ziyu. "Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories". Highlights in Science, Engineering and Technology 85 (13 de marzo de 2024): 89–95. http://dx.doi.org/10.54097/mwyge502.
Texto completoMa, Chencheng, Xuehui Du y Lifeng Cao. "Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow". Electronics 9, n.º 2 (13 de febrero de 2020): 324. http://dx.doi.org/10.3390/electronics9020324.
Texto completoMeghdouri, Fares, Tanja Zseby y Félix Iglesias. "Analysis of Lightweight Feature Vectors for Attack Detection in Network Traffic". Applied Sciences 8, n.º 11 (9 de noviembre de 2018): 2196. http://dx.doi.org/10.3390/app8112196.
Texto completoAfzal, Asmara, Mehdi Hussain, Shahzad Saleem, M. Khuram Shahzad, Anthony T. S. Ho y Ki-Hyun Jung. "Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App". Applied Sciences 11, n.º 17 (24 de agosto de 2021): 7789. http://dx.doi.org/10.3390/app11177789.
Texto completoOh, Chaeyeon, Joonseo Ha y Heejun Roh. "A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers". Applied Sciences 12, n.º 1 (24 de diciembre de 2021): 155. http://dx.doi.org/10.3390/app12010155.
Texto completoHaywood, Gregor Tamati y Saleem Noel Bhatti. "Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths". Cryptography 8, n.º 2 (28 de mayo de 2024): 22. http://dx.doi.org/10.3390/cryptography8020022.
Texto completoHu, Xinyi, Chunxiang Gu, Yihang Chen y Fushan Wei. "CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method". Sensors 21, n.º 24 (9 de diciembre de 2021): 8231. http://dx.doi.org/10.3390/s21248231.
Texto completoVizitiu, Anamaria, Cosmin-Ioan Nita, Radu Miron Toev, Tudor Suditu, Constantin Suciu y Lucian Mihai Itu. "Framework for Privacy-Preserving Wearable Health Data Analysis: Proof-of-Concept Study for Atrial Fibrillation Detection". Applied Sciences 11, n.º 19 (28 de septiembre de 2021): 9049. http://dx.doi.org/10.3390/app11199049.
Texto completoChoudhary, Swapna y Sanjay Dorle. "Secured SDN Based Blockchain: An Architecture to Improve the Security of VANET". International journal of electrical and computer engineering systems 13, n.º 2 (28 de febrero de 2022): 145–53. http://dx.doi.org/10.32985/ijeces.13.2.7.
Texto completoDemertzis, Konstantinos, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez y Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence". Big Data and Cognitive Computing 2, n.º 4 (22 de noviembre de 2018): 35. http://dx.doi.org/10.3390/bdcc2040035.
Texto completoLienkov, S. V., V. M. Dzhuliy y I. V. Muliar. "METHOD OF CLASSIFICATION OF PSEUDO-RANDOM SEQUENCES OF COMPRESSED AND ENCRYPTED DATA TO PREVENT INFORMATION LEAKAGE". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, n.º 82 (2024): 77–93. http://dx.doi.org/10.17721/2519-481x/2024/82-09.
Texto completoHe, Gaofeng, Bingfeng Xu y Haiting Zhu. "AppFA: A Novel Approach to Detect Malicious Android Applications on the Network". Security and Communication Networks 2018 (17 de abril de 2018): 1–15. http://dx.doi.org/10.1155/2018/2854728.
Texto completoRen, Guoqiang, Guang Cheng y Nan Fu. "Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network". Applied Sciences 13, n.º 3 (23 de enero de 2023): 1483. http://dx.doi.org/10.3390/app13031483.
Texto completoSubach, Ihor, Dmytro Sharadkin y Ihor Yakoviv. "APPLICATION OF METRIC METHODS OF HISTOGRAM COMPARISON FOR DETECTING CHANGES IN ENCRYPTED NETWORK TRAFFIC". Cybersecurity: Education, Science, Technique 1, n.º 25 (2024): 434–48. http://dx.doi.org/10.28925/2663-4023.2024.25.434448.
Texto completoChaddad, Louma, Ali Chehab, Imad H. Elhajj y Ayman Kayssi. "Optimal Packet Camouflage Against Traffic Analysis". ACM Transactions on Privacy and Security 24, n.º 3 (31 de agosto de 2021): 1–23. http://dx.doi.org/10.1145/3442697.
Texto completoLapshichyov, Vitaly y Oleg Makarevich. "Identification of the "Tor" Network https-Connection Version tls v1.3". Voprosy kiberbezopasnosti, n.º 6(40) (2020): 57–62. http://dx.doi.org/10.21681/2311-3456-2020-06-57-62.
Texto completoSelvaraj, Prabha, Vijay Kumar Burugari, S. Gopikrishnan, Abdullah Alourani , Gautam Srivastava y Mohamed Baza. "An Enhanced and Secure Trust-Aware Improved GSO for Encrypted Data Sharing in the Internet of Things". Applied Sciences 13, n.º 2 (7 de enero de 2023): 831. http://dx.doi.org/10.3390/app13020831.
Texto completoSingh, Purushottam, Sandip Dutta y Prashant Pranav. "Optimizing GANs for Cryptography: The Role and Impact of Activation Functions in Neural Layers Assessing the Cryptographic Strength". Applied Sciences 14, n.º 6 (12 de marzo de 2024): 2379. http://dx.doi.org/10.3390/app14062379.
Texto completoWang, Wei, Cheng Sheng Sun y Jia Ning Ye. "A Method for TLS Malicious Traffic Identification Based on Machine Learning". Advances in Science and Technology 105 (abril de 2021): 291–301. http://dx.doi.org/10.4028/www.scientific.net/ast.105.291.
Texto completoSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee y Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT". Applied Sciences 11, n.º 18 (20 de septiembre de 2021): 8757. http://dx.doi.org/10.3390/app11188757.
Texto completoLi, Mengyao, Xianwen Fang y Asimeng Ernest. "A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition". Mathematics 11, n.º 15 (25 de julio de 2023): 3274. http://dx.doi.org/10.3390/math11153274.
Texto completoGao, Shu-Yang, Xiao-Hong Li y Mao-De Ma. "A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol". Sensors 19, n.º 23 (22 de noviembre de 2019): 5122. http://dx.doi.org/10.3390/s19235122.
Texto completoSattar, Kanza Abdul, Takreem Haider, Umar Hayat y Miguel D. Bustamante. "An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform". Applied Sciences 13, n.º 14 (20 de julio de 2023): 8385. http://dx.doi.org/10.3390/app13148385.
Texto completoPachilakis, Michalis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos y Nicolas Kourtellis. "YourAdvalue". ACM SIGMETRICS Performance Evaluation Review 50, n.º 1 (20 de junio de 2022): 41–42. http://dx.doi.org/10.1145/3547353.3522629.
Texto completoWang, Guanyu y Yijun Gu. "Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis". Sensors 24, n.º 10 (12 de mayo de 2024): 3078. http://dx.doi.org/10.3390/s24103078.
Texto completoPachilakis, Michalis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos y Nicolas Kourtellis. "YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy". Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, n.º 3 (14 de diciembre de 2021): 1–26. http://dx.doi.org/10.1145/3491044.
Texto completoAlwhbi, Ibrahim A., Cliff C. Zou y Reem N. Alharbi. "Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning". Sensors 24, n.º 11 (29 de mayo de 2024): 3509. http://dx.doi.org/10.3390/s24113509.
Texto completoLi, Minghui, Zhendong Wu, Keming Chen y Wenhai Wang. "Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis". Symmetry 14, n.º 11 (6 de noviembre de 2022): 2329. http://dx.doi.org/10.3390/sym14112329.
Texto completoJung, In-Su, Yu-Rae Song, Lelisa Adeba Jilcha, Deuk-Hun Kim, Sun-Young Im, Shin-Woo Shim, Young-Hwan Kim y Jin Kwak. "Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction". Symmetry 16, n.º 6 (12 de junio de 2024): 733. http://dx.doi.org/10.3390/sym16060733.
Texto completoCao, Jie, Xing-Liang Yuan, Ying Cui, Jia-Cheng Fan y Chin-Ling Chen. "A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning". Applied Sciences 12, n.º 13 (24 de junio de 2022): 6434. http://dx.doi.org/10.3390/app12136434.
Texto completoJeng, Tzung-Han, Wen-Yang Luo, Chuan-Chiang Huang, Chien-Chih Chen, Kuang-Hung Chang y Yi-Ming Chen. "Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration". International Journal of Grid and High Performance Computing 13, n.º 3 (julio de 2021): 12–29. http://dx.doi.org/10.4018/ijghpc.2021070102.
Texto completoPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan y Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data". Future Internet 14, n.º 2 (21 de febrero de 2022): 67. http://dx.doi.org/10.3390/fi14020067.
Texto completoZheng, Juan, Zhiyong Zeng y Tao Feng. "GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection". Security and Communication Networks 2022 (22 de enero de 2022): 1–11. http://dx.doi.org/10.1155/2022/4274139.
Texto completoTaylor, Vincent F., Riccardo Spolaor, Mauro Conti y Ivan Martinovic. "Robust Smartphone App Identification via Encrypted Network Traffic Analysis". IEEE Transactions on Information Forensics and Security 13, n.º 1 (enero de 2018): 63–78. http://dx.doi.org/10.1109/tifs.2017.2737970.
Texto completoKaraçay, Leyli, Erkay Savaş y Halit Alptekin. "Intrusion Detection Over Encrypted Network Data". Computer Journal 63, n.º 4 (17 de noviembre de 2019): 604–19. http://dx.doi.org/10.1093/comjnl/bxz111.
Texto completoYang, Xiaoqing, Niwat Angkawisittpan y Xinyue Feng. "Analysis of an enhanced random forest algorithm for identifying encrypted network traffic". EUREKA: Physics and Engineering, n.º 5 (10 de septiembre de 2024): 201–12. http://dx.doi.org/10.21303/2461-4262.2024.003372.
Texto completoFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum y Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication". ACM Transactions on Privacy and Security 25, n.º 3 (31 de agosto de 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Texto completoXu, Guoliang, Ming Xu, Yunzhi Chen y Jiaqi Zhao. "A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic". Electronics 12, n.º 10 (20 de mayo de 2023): 2313. http://dx.doi.org/10.3390/electronics12102313.
Texto completoHuang, Yung-Fa, Chuan-Bi Lin, Chien-Min Chung y Ching-Mu Chen. "Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning". Electronics 10, n.º 12 (8 de junio de 2021): 1376. http://dx.doi.org/10.3390/electronics10121376.
Texto completoDeri, Luca y Daniele Sartiano. "Using DPI and Statistical Analysis in Encrypted Network Traffic Monitoring". International Journal for Information Security Research 10, n.º 1 (30 de diciembre de 2020): 932–43. http://dx.doi.org/10.20533/ijisr.2042.4639.2020.0107.
Texto completoPotter, Bruce. "Network flow analysis". Network Security 2007, n.º 12 (diciembre de 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70105-8.
Texto completoDai, Xianlong, Guang Cheng, Ziyang Yu, Ruixing Zhu y Yali Yuan. "MSLCFinder: An Algorithm in Limited Resources Environment for Finding Top-k Elephant Flows". Applied Sciences 13, n.º 1 (31 de diciembre de 2022): 575. http://dx.doi.org/10.3390/app13010575.
Texto completoChernov, Pavel y Aleksander Shkaraputa. "Modification of the algorithm based on the Feistel network by adding an element of randomness into the encryption key". Вестник Пермского университета. Математика. Механика. Информатика, n.º 1(52) (2021): 81–88. http://dx.doi.org/10.17072/1993-0550-2021-1-81-88.
Texto completoPark, Jee-Tae, Chang-Yui Shin, Ui-Jun Baek y Myung-Sup Kim. "Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification". Applied Sciences 14, n.º 7 (5 de abril de 2024): 3073. http://dx.doi.org/10.3390/app14073073.
Texto completoBaldini, Gianmarco, José L. Hernandez-Ramos, Slawomir Nowak, Ricardo Neisse y Mateusz Nowak. "Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles". Symmetry 12, n.º 9 (22 de septiembre de 2020): 1576. http://dx.doi.org/10.3390/sym12091576.
Texto completoGuo, Maohua y Jinlong Fei. "Website Fingerprinting Attacks Based on Homology Analysis". Security and Communication Networks 2021 (4 de octubre de 2021): 1–14. http://dx.doi.org/10.1155/2021/6070451.
Texto completoGuo, Maohua y Jinlong Fei. "Website Fingerprinting Attacks Based on Homology Analysis". Security and Communication Networks 2021 (4 de octubre de 2021): 1–14. http://dx.doi.org/10.1155/2021/6070451.
Texto completoLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence". Mathematical Problems in Engineering 2022 (22 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Texto completoPapadogiannaki, Eva y Sotiris Ioannidis. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures". ACM Computing Surveys 54, n.º 6 (julio de 2021): 1–35. http://dx.doi.org/10.1145/3457904.
Texto completo