Search

Your search keyword '"Deep packet inspection"' showing total 1,366 results

Search Constraints

Start Over You searched for: Descriptor "Deep packet inspection" Remove constraint Descriptor: "Deep packet inspection"
1,366 results on '"Deep packet inspection"'

Search Results

201. Benchmarking of compressed DFAs for traffic identification: Decoupling data structures from models.

202. Efficient DFA grouping for traffic identification.

203. Design of the Network Traffic Anomaly Detection System in Cloud Computing Environment.

204. A case for trusted sensors: Encryptors with Deep Packet Inspection capabilities.

205. On Detection Accuracy of L7-filter and OpenDPI.

206. Study of P2P flow detection technology.

207. A unique-pattern based pre-filtering method for rule matching of network security.

208. Deterministic Finite Automaton for scalable traffic identification: The power of compressing by range.

209. Custom purpose regular expression processor architecture for network processing.

210. Characterizing signature sets for testing DPI systems.

211. Research optical network traffic based on the content identification.

212. Machine Learning based Malicious Payload Identification in Software-Defined Networking

213. DPI Solutions in Practice: Benchmark and Comparison

214. A General Framework for Matching Pattern Hiding in Deep Packet Inspection

215. Prevention of Intrusion Attacks via Deep Learning Algorithm in Wireless Sensor Network in Smart Cities

216. An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems

217. Stopping DNS Rebinding Attacks in the Browser

218. DNS-Morph: UDP-Based Bootstrapping Protocol for Tor

219. Instant Messaging Application Traffic Recognition

220. Coarse Traffic Classification for High-Bandwidth Connections in a Computer Network Using Deep Learning Techniques

221. Evaluation of Machine Learning Algorithms for Intrusion Detection System in WSN

222. Industrial Cyber Security at the Network Edge: The BRAINE Project Approach

223. Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications

224. PICAndro: Packet InspeCtion-Based Android Malware Detection

225. Efficient compression algorithm for ternary content addressable memory‐based regular expression matching.

226. From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy... The case of deep packet inspection technologies.

227. Bypassing Space Explosion in High-Speed Regular Expression Matching.

228. Internet Traffic Classification with Federated Learning

229. Traffic Classification of QoS Types Based on Machine Learning Combined with IP Query and Deep Packet Inspection

230. Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis

231. DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC

232. Federated Deep Payload Classification for Industrial Internet with Cloud-Edge Architecture

233. Preventing DRDoS Attacks in 5G Networks: a New Source IP Address Validation Approach

234. VPN Traffic Classification Based on Payload Length Sequence

235. A regular expression matching engine with hybrid memories.

236. Reduction of Power Consumption for Pipelined DPI Systems on FPGA.

237. Deep Packet Inspection in Firewall Clusters

238. DeepMatch

239. SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps Networks

240. 5G Network Slicing Enabling Edge Services

241. You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

242. SeLeCT: Self-Learning Classifier for Internet Traffic.

243. Reduced Power Consumption via Fewer Memory Accesses for Deep Packet Inspection.

244. Network Traffic Detection with Cloud Computing.

245. CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions.

246. Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors

247. nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks

248. Classification of VPN Network Traffic Flow Using Time Related Features on Apache Spark

249. Cluster Analysis and Statistical Modeling: A Unified Approach for Packet Inspection

250. Policy implications of technology for detecting P2P and copyright violations.

Catalog

Books, media, physical & digital resources