Статті в журналах з теми "Analysis of encrypted network flow"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Analysis of encrypted network flow".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Yan, Xiaodan. "Deep Learning-Based Efficient Analysis for Encrypted Traffic." Applied Sciences 13, no. 21 (October 27, 2023): 11776. http://dx.doi.org/10.3390/app132111776.
Повний текст джерелаJiang, Ziyu. "Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 89–95. http://dx.doi.org/10.54097/mwyge502.
Повний текст джерелаMa, Chencheng, Xuehui Du, and Lifeng Cao. "Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow." Electronics 9, no. 2 (February 13, 2020): 324. http://dx.doi.org/10.3390/electronics9020324.
Повний текст джерелаMeghdouri, Fares, Tanja Zseby, and Félix Iglesias. "Analysis of Lightweight Feature Vectors for Attack Detection in Network Traffic." Applied Sciences 8, no. 11 (November 9, 2018): 2196. http://dx.doi.org/10.3390/app8112196.
Повний текст джерелаAfzal, Asmara, Mehdi Hussain, Shahzad Saleem, M. Khuram Shahzad, Anthony T. S. Ho, and Ki-Hyun Jung. "Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App." Applied Sciences 11, no. 17 (August 24, 2021): 7789. http://dx.doi.org/10.3390/app11177789.
Повний текст джерелаOh, Chaeyeon, Joonseo Ha, and Heejun Roh. "A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers." Applied Sciences 12, no. 1 (December 24, 2021): 155. http://dx.doi.org/10.3390/app12010155.
Повний текст джерелаHaywood, Gregor Tamati, and Saleem Noel Bhatti. "Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths." Cryptography 8, no. 2 (May 28, 2024): 22. http://dx.doi.org/10.3390/cryptography8020022.
Повний текст джерелаHu, Xinyi, Chunxiang Gu, Yihang Chen, and Fushan Wei. "CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method." Sensors 21, no. 24 (December 9, 2021): 8231. http://dx.doi.org/10.3390/s21248231.
Повний текст джерелаVizitiu, Anamaria, Cosmin-Ioan Nita, Radu Miron Toev, Tudor Suditu, Constantin Suciu, and Lucian Mihai Itu. "Framework for Privacy-Preserving Wearable Health Data Analysis: Proof-of-Concept Study for Atrial Fibrillation Detection." Applied Sciences 11, no. 19 (September 28, 2021): 9049. http://dx.doi.org/10.3390/app11199049.
Повний текст джерелаChoudhary, Swapna, and Sanjay Dorle. "Secured SDN Based Blockchain: An Architecture to Improve the Security of VANET." International journal of electrical and computer engineering systems 13, no. 2 (February 28, 2022): 145–53. http://dx.doi.org/10.32985/ijeces.13.2.7.
Повний текст джерелаDemertzis, Konstantinos, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez, and Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence." Big Data and Cognitive Computing 2, no. 4 (November 22, 2018): 35. http://dx.doi.org/10.3390/bdcc2040035.
Повний текст джерелаLienkov, S. V., V. M. Dzhuliy, and I. V. Muliar. "METHOD OF CLASSIFICATION OF PSEUDO-RANDOM SEQUENCES OF COMPRESSED AND ENCRYPTED DATA TO PREVENT INFORMATION LEAKAGE." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 82 (2024): 77–93. http://dx.doi.org/10.17721/2519-481x/2024/82-09.
Повний текст джерелаHe, Gaofeng, Bingfeng Xu, and Haiting Zhu. "AppFA: A Novel Approach to Detect Malicious Android Applications on the Network." Security and Communication Networks 2018 (April 17, 2018): 1–15. http://dx.doi.org/10.1155/2018/2854728.
Повний текст джерелаRen, Guoqiang, Guang Cheng, and Nan Fu. "Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network." Applied Sciences 13, no. 3 (January 23, 2023): 1483. http://dx.doi.org/10.3390/app13031483.
Повний текст джерелаSubach, Ihor, Dmytro Sharadkin, and Ihor Yakoviv. "APPLICATION OF METRIC METHODS OF HISTOGRAM COMPARISON FOR DETECTING CHANGES IN ENCRYPTED NETWORK TRAFFIC." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 434–48. http://dx.doi.org/10.28925/2663-4023.2024.25.434448.
Повний текст джерелаChaddad, Louma, Ali Chehab, Imad H. Elhajj, and Ayman Kayssi. "Optimal Packet Camouflage Against Traffic Analysis." ACM Transactions on Privacy and Security 24, no. 3 (August 31, 2021): 1–23. http://dx.doi.org/10.1145/3442697.
Повний текст джерелаLapshichyov, Vitaly, and Oleg Makarevich. "Identification of the "Tor" Network https-Connection Version tls v1.3." Voprosy kiberbezopasnosti, no. 6(40) (2020): 57–62. http://dx.doi.org/10.21681/2311-3456-2020-06-57-62.
Повний текст джерелаSelvaraj, Prabha, Vijay Kumar Burugari, S. Gopikrishnan, Abdullah Alourani , Gautam Srivastava, and Mohamed Baza. "An Enhanced and Secure Trust-Aware Improved GSO for Encrypted Data Sharing in the Internet of Things." Applied Sciences 13, no. 2 (January 7, 2023): 831. http://dx.doi.org/10.3390/app13020831.
Повний текст джерелаSingh, Purushottam, Sandip Dutta, and Prashant Pranav. "Optimizing GANs for Cryptography: The Role and Impact of Activation Functions in Neural Layers Assessing the Cryptographic Strength." Applied Sciences 14, no. 6 (March 12, 2024): 2379. http://dx.doi.org/10.3390/app14062379.
Повний текст джерелаWang, Wei, Cheng Sheng Sun, and Jia Ning Ye. "A Method for TLS Malicious Traffic Identification Based on Machine Learning." Advances in Science and Technology 105 (April 2021): 291–301. http://dx.doi.org/10.4028/www.scientific.net/ast.105.291.
Повний текст джерелаSalim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee, and Jong Hyuk Park. "Homomorphic Encryption Based Privacy-Preservation for IoMT." Applied Sciences 11, no. 18 (September 20, 2021): 8757. http://dx.doi.org/10.3390/app11188757.
Повний текст джерелаLi, Mengyao, Xianwen Fang, and Asimeng Ernest. "A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition." Mathematics 11, no. 15 (July 25, 2023): 3274. http://dx.doi.org/10.3390/math11153274.
Повний текст джерелаGao, Shu-Yang, Xiao-Hong Li, and Mao-De Ma. "A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol." Sensors 19, no. 23 (November 22, 2019): 5122. http://dx.doi.org/10.3390/s19235122.
Повний текст джерелаSattar, Kanza Abdul, Takreem Haider, Umar Hayat, and Miguel D. Bustamante. "An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform." Applied Sciences 13, no. 14 (July 20, 2023): 8385. http://dx.doi.org/10.3390/app13148385.
Повний текст джерелаPachilakis, Michalis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos, and Nicolas Kourtellis. "YourAdvalue." ACM SIGMETRICS Performance Evaluation Review 50, no. 1 (June 20, 2022): 41–42. http://dx.doi.org/10.1145/3547353.3522629.
Повний текст джерелаWang, Guanyu, and Yijun Gu. "Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis." Sensors 24, no. 10 (May 12, 2024): 3078. http://dx.doi.org/10.3390/s24103078.
Повний текст джерелаPachilakis, Michalis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos, and Nicolas Kourtellis. "YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy." Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, no. 3 (December 14, 2021): 1–26. http://dx.doi.org/10.1145/3491044.
Повний текст джерелаAlwhbi, Ibrahim A., Cliff C. Zou, and Reem N. Alharbi. "Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning." Sensors 24, no. 11 (May 29, 2024): 3509. http://dx.doi.org/10.3390/s24113509.
Повний текст джерелаLi, Minghui, Zhendong Wu, Keming Chen, and Wenhai Wang. "Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis." Symmetry 14, no. 11 (November 6, 2022): 2329. http://dx.doi.org/10.3390/sym14112329.
Повний текст джерелаJung, In-Su, Yu-Rae Song, Lelisa Adeba Jilcha, Deuk-Hun Kim, Sun-Young Im, Shin-Woo Shim, Young-Hwan Kim, and Jin Kwak. "Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction." Symmetry 16, no. 6 (June 12, 2024): 733. http://dx.doi.org/10.3390/sym16060733.
Повний текст джерелаCao, Jie, Xing-Liang Yuan, Ying Cui, Jia-Cheng Fan, and Chin-Ling Chen. "A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning." Applied Sciences 12, no. 13 (June 24, 2022): 6434. http://dx.doi.org/10.3390/app12136434.
Повний текст джерелаJeng, Tzung-Han, Wen-Yang Luo, Chuan-Chiang Huang, Chien-Chih Chen, Kuang-Hung Chang, and Yi-Ming Chen. "Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration." International Journal of Grid and High Performance Computing 13, no. 3 (July 2021): 12–29. http://dx.doi.org/10.4018/ijghpc.2021070102.
Повний текст джерелаPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (February 21, 2022): 67. http://dx.doi.org/10.3390/fi14020067.
Повний текст джерелаZheng, Juan, Zhiyong Zeng, and Tao Feng. "GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection." Security and Communication Networks 2022 (January 22, 2022): 1–11. http://dx.doi.org/10.1155/2022/4274139.
Повний текст джерелаTaylor, Vincent F., Riccardo Spolaor, Mauro Conti, and Ivan Martinovic. "Robust Smartphone App Identification via Encrypted Network Traffic Analysis." IEEE Transactions on Information Forensics and Security 13, no. 1 (January 2018): 63–78. http://dx.doi.org/10.1109/tifs.2017.2737970.
Повний текст джерелаKaraçay, Leyli, Erkay Savaş, and Halit Alptekin. "Intrusion Detection Over Encrypted Network Data." Computer Journal 63, no. 4 (November 17, 2019): 604–19. http://dx.doi.org/10.1093/comjnl/bxz111.
Повний текст джерелаYang, Xiaoqing, Niwat Angkawisittpan, and Xinyue Feng. "Analysis of an enhanced random forest algorithm for identifying encrypted network traffic." EUREKA: Physics and Engineering, no. 5 (September 10, 2024): 201–12. http://dx.doi.org/10.21303/2461-4262.2024.003372.
Повний текст джерелаFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, and Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Повний текст джерелаXu, Guoliang, Ming Xu, Yunzhi Chen, and Jiaqi Zhao. "A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic." Electronics 12, no. 10 (May 20, 2023): 2313. http://dx.doi.org/10.3390/electronics12102313.
Повний текст джерелаHuang, Yung-Fa, Chuan-Bi Lin, Chien-Min Chung, and Ching-Mu Chen. "Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning." Electronics 10, no. 12 (June 8, 2021): 1376. http://dx.doi.org/10.3390/electronics10121376.
Повний текст джерелаDeri, Luca, and Daniele Sartiano. "Using DPI and Statistical Analysis in Encrypted Network Traffic Monitoring." International Journal for Information Security Research 10, no. 1 (December 30, 2020): 932–43. http://dx.doi.org/10.20533/ijisr.2042.4639.2020.0107.
Повний текст джерелаPotter, Bruce. "Network flow analysis." Network Security 2007, no. 12 (December 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70105-8.
Повний текст джерелаDai, Xianlong, Guang Cheng, Ziyang Yu, Ruixing Zhu, and Yali Yuan. "MSLCFinder: An Algorithm in Limited Resources Environment for Finding Top-k Elephant Flows." Applied Sciences 13, no. 1 (December 31, 2022): 575. http://dx.doi.org/10.3390/app13010575.
Повний текст джерелаChernov, Pavel, and Aleksander Shkaraputa. "Modification of the algorithm based on the Feistel network by adding an element of randomness into the encryption key." Вестник Пермского университета. Математика. Механика. Информатика, no. 1(52) (2021): 81–88. http://dx.doi.org/10.17072/1993-0550-2021-1-81-88.
Повний текст джерелаPark, Jee-Tae, Chang-Yui Shin, Ui-Jun Baek, and Myung-Sup Kim. "Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification." Applied Sciences 14, no. 7 (April 5, 2024): 3073. http://dx.doi.org/10.3390/app14073073.
Повний текст джерелаBaldini, Gianmarco, José L. Hernandez-Ramos, Slawomir Nowak, Ricardo Neisse, and Mateusz Nowak. "Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles." Symmetry 12, no. 9 (September 22, 2020): 1576. http://dx.doi.org/10.3390/sym12091576.
Повний текст джерелаGuo, Maohua, and Jinlong Fei. "Website Fingerprinting Attacks Based on Homology Analysis." Security and Communication Networks 2021 (October 4, 2021): 1–14. http://dx.doi.org/10.1155/2021/6070451.
Повний текст джерелаGuo, Maohua, and Jinlong Fei. "Website Fingerprinting Attacks Based on Homology Analysis." Security and Communication Networks 2021 (October 4, 2021): 1–14. http://dx.doi.org/10.1155/2021/6070451.
Повний текст джерелаLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence." Mathematical Problems in Engineering 2022 (August 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Повний текст джерелаPapadogiannaki, Eva, and Sotiris Ioannidis. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–35. http://dx.doi.org/10.1145/3457904.
Повний текст джерела