Articoli di riviste sul tema "Analysis of encrypted network flow"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Analysis of encrypted network flow".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Yan, Xiaodan. "Deep Learning-Based Efficient Analysis for Encrypted Traffic". Applied Sciences 13, n. 21 (27 ottobre 2023): 11776. http://dx.doi.org/10.3390/app132111776.
Testo completoJiang, Ziyu. "Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories". Highlights in Science, Engineering and Technology 85 (13 marzo 2024): 89–95. http://dx.doi.org/10.54097/mwyge502.
Testo completoMa, Chencheng, Xuehui Du e Lifeng Cao. "Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow". Electronics 9, n. 2 (13 febbraio 2020): 324. http://dx.doi.org/10.3390/electronics9020324.
Testo completoMeghdouri, Fares, Tanja Zseby e Félix Iglesias. "Analysis of Lightweight Feature Vectors for Attack Detection in Network Traffic". Applied Sciences 8, n. 11 (9 novembre 2018): 2196. http://dx.doi.org/10.3390/app8112196.
Testo completoAfzal, Asmara, Mehdi Hussain, Shahzad Saleem, M. Khuram Shahzad, Anthony T. S. Ho e Ki-Hyun Jung. "Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App". Applied Sciences 11, n. 17 (24 agosto 2021): 7789. http://dx.doi.org/10.3390/app11177789.
Testo completoOh, Chaeyeon, Joonseo Ha e Heejun Roh. "A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers". Applied Sciences 12, n. 1 (24 dicembre 2021): 155. http://dx.doi.org/10.3390/app12010155.
Testo completoHaywood, Gregor Tamati, e Saleem Noel Bhatti. "Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths". Cryptography 8, n. 2 (28 maggio 2024): 22. http://dx.doi.org/10.3390/cryptography8020022.
Testo completoHu, Xinyi, Chunxiang Gu, Yihang Chen e Fushan Wei. "CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method". Sensors 21, n. 24 (9 dicembre 2021): 8231. http://dx.doi.org/10.3390/s21248231.
Testo completoVizitiu, Anamaria, Cosmin-Ioan Nita, Radu Miron Toev, Tudor Suditu, Constantin Suciu e Lucian Mihai Itu. "Framework for Privacy-Preserving Wearable Health Data Analysis: Proof-of-Concept Study for Atrial Fibrillation Detection". Applied Sciences 11, n. 19 (28 settembre 2021): 9049. http://dx.doi.org/10.3390/app11199049.
Testo completoChoudhary, Swapna, e Sanjay Dorle. "Secured SDN Based Blockchain: An Architecture to Improve the Security of VANET". International journal of electrical and computer engineering systems 13, n. 2 (28 febbraio 2022): 145–53. http://dx.doi.org/10.32985/ijeces.13.2.7.
Testo completoDemertzis, Konstantinos, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez e Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence". Big Data and Cognitive Computing 2, n. 4 (22 novembre 2018): 35. http://dx.doi.org/10.3390/bdcc2040035.
Testo completoLienkov, S. V., V. M. Dzhuliy e I. V. Muliar. "METHOD OF CLASSIFICATION OF PSEUDO-RANDOM SEQUENCES OF COMPRESSED AND ENCRYPTED DATA TO PREVENT INFORMATION LEAKAGE". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, n. 82 (2024): 77–93. http://dx.doi.org/10.17721/2519-481x/2024/82-09.
Testo completoHe, Gaofeng, Bingfeng Xu e Haiting Zhu. "AppFA: A Novel Approach to Detect Malicious Android Applications on the Network". Security and Communication Networks 2018 (17 aprile 2018): 1–15. http://dx.doi.org/10.1155/2018/2854728.
Testo completoRen, Guoqiang, Guang Cheng e Nan Fu. "Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network". Applied Sciences 13, n. 3 (23 gennaio 2023): 1483. http://dx.doi.org/10.3390/app13031483.
Testo completoSubach, Ihor, Dmytro Sharadkin e Ihor Yakoviv. "APPLICATION OF METRIC METHODS OF HISTOGRAM COMPARISON FOR DETECTING CHANGES IN ENCRYPTED NETWORK TRAFFIC". Cybersecurity: Education, Science, Technique 1, n. 25 (2024): 434–48. http://dx.doi.org/10.28925/2663-4023.2024.25.434448.
Testo completoChaddad, Louma, Ali Chehab, Imad H. Elhajj e Ayman Kayssi. "Optimal Packet Camouflage Against Traffic Analysis". ACM Transactions on Privacy and Security 24, n. 3 (31 agosto 2021): 1–23. http://dx.doi.org/10.1145/3442697.
Testo completoLapshichyov, Vitaly, e Oleg Makarevich. "Identification of the "Tor" Network https-Connection Version tls v1.3". Voprosy kiberbezopasnosti, n. 6(40) (2020): 57–62. http://dx.doi.org/10.21681/2311-3456-2020-06-57-62.
Testo completoSelvaraj, Prabha, Vijay Kumar Burugari, S. Gopikrishnan, Abdullah Alourani , Gautam Srivastava e Mohamed Baza. "An Enhanced and Secure Trust-Aware Improved GSO for Encrypted Data Sharing in the Internet of Things". Applied Sciences 13, n. 2 (7 gennaio 2023): 831. http://dx.doi.org/10.3390/app13020831.
Testo completoSingh, Purushottam, Sandip Dutta e Prashant Pranav. "Optimizing GANs for Cryptography: The Role and Impact of Activation Functions in Neural Layers Assessing the Cryptographic Strength". Applied Sciences 14, n. 6 (12 marzo 2024): 2379. http://dx.doi.org/10.3390/app14062379.
Testo completoWang, Wei, Cheng Sheng Sun e Jia Ning Ye. "A Method for TLS Malicious Traffic Identification Based on Machine Learning". Advances in Science and Technology 105 (aprile 2021): 291–301. http://dx.doi.org/10.4028/www.scientific.net/ast.105.291.
Testo completoSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee e Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT". Applied Sciences 11, n. 18 (20 settembre 2021): 8757. http://dx.doi.org/10.3390/app11188757.
Testo completoLi, Mengyao, Xianwen Fang e Asimeng Ernest. "A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition". Mathematics 11, n. 15 (25 luglio 2023): 3274. http://dx.doi.org/10.3390/math11153274.
Testo completoGao, Shu-Yang, Xiao-Hong Li e Mao-De Ma. "A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol". Sensors 19, n. 23 (22 novembre 2019): 5122. http://dx.doi.org/10.3390/s19235122.
Testo completoSattar, Kanza Abdul, Takreem Haider, Umar Hayat e Miguel D. Bustamante. "An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform". Applied Sciences 13, n. 14 (20 luglio 2023): 8385. http://dx.doi.org/10.3390/app13148385.
Testo completoPachilakis, Michalis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos e Nicolas Kourtellis. "YourAdvalue". ACM SIGMETRICS Performance Evaluation Review 50, n. 1 (20 giugno 2022): 41–42. http://dx.doi.org/10.1145/3547353.3522629.
Testo completoWang, Guanyu, e Yijun Gu. "Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis". Sensors 24, n. 10 (12 maggio 2024): 3078. http://dx.doi.org/10.3390/s24103078.
Testo completoPachilakis, Michalis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos e Nicolas Kourtellis. "YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy". Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, n. 3 (14 dicembre 2021): 1–26. http://dx.doi.org/10.1145/3491044.
Testo completoAlwhbi, Ibrahim A., Cliff C. Zou e Reem N. Alharbi. "Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning". Sensors 24, n. 11 (29 maggio 2024): 3509. http://dx.doi.org/10.3390/s24113509.
Testo completoLi, Minghui, Zhendong Wu, Keming Chen e Wenhai Wang. "Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis". Symmetry 14, n. 11 (6 novembre 2022): 2329. http://dx.doi.org/10.3390/sym14112329.
Testo completoJung, In-Su, Yu-Rae Song, Lelisa Adeba Jilcha, Deuk-Hun Kim, Sun-Young Im, Shin-Woo Shim, Young-Hwan Kim e Jin Kwak. "Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction". Symmetry 16, n. 6 (12 giugno 2024): 733. http://dx.doi.org/10.3390/sym16060733.
Testo completoCao, Jie, Xing-Liang Yuan, Ying Cui, Jia-Cheng Fan e Chin-Ling Chen. "A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning". Applied Sciences 12, n. 13 (24 giugno 2022): 6434. http://dx.doi.org/10.3390/app12136434.
Testo completoJeng, Tzung-Han, Wen-Yang Luo, Chuan-Chiang Huang, Chien-Chih Chen, Kuang-Hung Chang e Yi-Ming Chen. "Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration". International Journal of Grid and High Performance Computing 13, n. 3 (luglio 2021): 12–29. http://dx.doi.org/10.4018/ijghpc.2021070102.
Testo completoPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan e Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data". Future Internet 14, n. 2 (21 febbraio 2022): 67. http://dx.doi.org/10.3390/fi14020067.
Testo completoZheng, Juan, Zhiyong Zeng e Tao Feng. "GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection". Security and Communication Networks 2022 (22 gennaio 2022): 1–11. http://dx.doi.org/10.1155/2022/4274139.
Testo completoTaylor, Vincent F., Riccardo Spolaor, Mauro Conti e Ivan Martinovic. "Robust Smartphone App Identification via Encrypted Network Traffic Analysis". IEEE Transactions on Information Forensics and Security 13, n. 1 (gennaio 2018): 63–78. http://dx.doi.org/10.1109/tifs.2017.2737970.
Testo completoKaraçay, Leyli, Erkay Savaş e Halit Alptekin. "Intrusion Detection Over Encrypted Network Data". Computer Journal 63, n. 4 (17 novembre 2019): 604–19. http://dx.doi.org/10.1093/comjnl/bxz111.
Testo completoYang, Xiaoqing, Niwat Angkawisittpan e Xinyue Feng. "Analysis of an enhanced random forest algorithm for identifying encrypted network traffic". EUREKA: Physics and Engineering, n. 5 (10 settembre 2024): 201–12. http://dx.doi.org/10.21303/2461-4262.2024.003372.
Testo completoFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum e Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication". ACM Transactions on Privacy and Security 25, n. 3 (31 agosto 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Testo completoXu, Guoliang, Ming Xu, Yunzhi Chen e Jiaqi Zhao. "A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic". Electronics 12, n. 10 (20 maggio 2023): 2313. http://dx.doi.org/10.3390/electronics12102313.
Testo completoHuang, Yung-Fa, Chuan-Bi Lin, Chien-Min Chung e Ching-Mu Chen. "Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning". Electronics 10, n. 12 (8 giugno 2021): 1376. http://dx.doi.org/10.3390/electronics10121376.
Testo completoDeri, Luca, e Daniele Sartiano. "Using DPI and Statistical Analysis in Encrypted Network Traffic Monitoring". International Journal for Information Security Research 10, n. 1 (30 dicembre 2020): 932–43. http://dx.doi.org/10.20533/ijisr.2042.4639.2020.0107.
Testo completoPotter, Bruce. "Network flow analysis". Network Security 2007, n. 12 (dicembre 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70105-8.
Testo completoDai, Xianlong, Guang Cheng, Ziyang Yu, Ruixing Zhu e Yali Yuan. "MSLCFinder: An Algorithm in Limited Resources Environment for Finding Top-k Elephant Flows". Applied Sciences 13, n. 1 (31 dicembre 2022): 575. http://dx.doi.org/10.3390/app13010575.
Testo completoChernov, Pavel, e Aleksander Shkaraputa. "Modification of the algorithm based on the Feistel network by adding an element of randomness into the encryption key". Вестник Пермского университета. Математика. Механика. Информатика, n. 1(52) (2021): 81–88. http://dx.doi.org/10.17072/1993-0550-2021-1-81-88.
Testo completoPark, Jee-Tae, Chang-Yui Shin, Ui-Jun Baek e Myung-Sup Kim. "Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification". Applied Sciences 14, n. 7 (5 aprile 2024): 3073. http://dx.doi.org/10.3390/app14073073.
Testo completoBaldini, Gianmarco, José L. Hernandez-Ramos, Slawomir Nowak, Ricardo Neisse e Mateusz Nowak. "Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles". Symmetry 12, n. 9 (22 settembre 2020): 1576. http://dx.doi.org/10.3390/sym12091576.
Testo completoGuo, Maohua, e Jinlong Fei. "Website Fingerprinting Attacks Based on Homology Analysis". Security and Communication Networks 2021 (4 ottobre 2021): 1–14. http://dx.doi.org/10.1155/2021/6070451.
Testo completoGuo, Maohua, e Jinlong Fei. "Website Fingerprinting Attacks Based on Homology Analysis". Security and Communication Networks 2021 (4 ottobre 2021): 1–14. http://dx.doi.org/10.1155/2021/6070451.
Testo completoLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence". Mathematical Problems in Engineering 2022 (22 agosto 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Testo completoPapadogiannaki, Eva, e Sotiris Ioannidis. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures". ACM Computing Surveys 54, n. 6 (luglio 2021): 1–35. http://dx.doi.org/10.1145/3457904.
Testo completo