Search

Your search keyword '"Network traffic analysis"' showing total 128 results

Search Constraints

Start Over You searched for: Descriptor "Network traffic analysis" Remove constraint Descriptor: "Network traffic analysis" Database OAIster Remove constraint Database: OAIster
128 results on '"Network traffic analysis"'

Search Results

1. NETWORK ATTACK RECOGNITION USING FUZZY LOGIC

2. Enhancing Network Security through Investigative Traffic Analysis: A Case Study

3. Strengthening Cyber Defense : A Comparative Study of Smart Home Infrastructure for Penetration Testing and National Cyber Ranges

4. Strengthening Cyber Defense : A Comparative Study of Smart Home Infrastructure for Penetration Testing and National Cyber Ranges

5. Enhancing Network Security through Investigative Traffic Analysis: A Case Study

6. ANOMALY DETECTION ON FLOWS AND INCOMING PACKETS WITH GAUSSIAN MIXTURES

7. MalBoT-DRL: Malware botnet detection using deep reinforcement learning in IoT networks

8. Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance

9. Detection, Quantification, and Mitigation of Network Side Channels

10. Multiple Strategies Differential Privacy on Sparse Tensor Factorization for Network Traffic Analysis in 5G

11. USER IDENTIFICATION IN DYNAMIC WEB TRAFFIC VIA DEEP TEMPORAL FEATURES

12. Multiple Strategies Differential Privacy on Sparse Tensor Factorization for Network Traffic Analysis in 5G

13. VPN Fingerprinting: Network protocol detection inside virtual private network tunnels

14. Statistical-entropy method of searching for fields in traffic of unknown protocols

15. CHARACTERIZING BGP COMMUNITY IRREGULARITIES TOWARD AN ANOMALY DETECTION ENGINE

16. Toward a sustainable cybersecurity ecosystem

17. Anomaly Detection in Network Traffic using Multivariate State Machines

18. INSTANT MESSAGE TRAFFIC META-DATA AND ITS SUSCEPTIBILITY TO TRAFFIC ANALYSIS

19. Detecting Hidden Wireless Cameras through Network Traffic Analysis

20. Toward a sustainable cybersecurity ecosystem

21. Anomaly Detection in Network Traffic using Multivariate State Machines

22. Slow Dos Attacks Detection And Mitigation

23. Privacy and security in internet-connected cameras

24. Multivariate network traffic analysis using clustered patterns

25. A New Approach to Multivariate Network Traffic Analysis

26. Android App Tracking: Investigating the feasibility of tracking user behavior on mobile phones by analyzing encrypted network traffic

27. Automated data exfiltration detection using netflow metadata

28. MultiProxy: a collaborative approach to censorship circumvention

29. A New Approach to Multivariate Network Traffic Analysis

30. Multivariate network traffic analysis using clustered patterns

31. Privacy and security in internet-connected cameras

32. Slow Dos Attacks Detection And Mitigation

33. Slow Dos Attacks Detection And Mitigation

34. Slow Dos Attacks Detection And Mitigation

35. Slow Dos Attacks Detection And Mitigation

36. Slow Dos Attacks Detection And Mitigation

37. Android App Tracking: Investigating the feasibility of tracking user behavior on mobile phones by analyzing encrypted network traffic

38. Automated data exfiltration detection using netflow metadata

39. MultiProxy: a collaborative approach to censorship circumvention

40. Development of a method for the experimental estimation of multimedia data flow rate in a computer network

41. Limitations of passively mapping logical network topologies

42. Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization

43. Component modeling for SCADA network mapping

44. The zombies strike back: Towards client-side beef detection

45. Association hierarchy mining and its application for network traffic characterisation

46. The zombies strike back: Towards client-side BeEFdetection

47. The zombies strike back: Towards client-side BeEF detection

48. The zombies strike back: Towards client-side BeEF detection

49. File Detection on Network Traffic Using Approximate Matching

50. A hybrid association rule mining approach for characterizing network traffic behaviour

Catalog

Books, media, physical & digital resources