Search

Your search keyword '"Network Traffic"' showing total 1,579 results

Search Constraints

Start Over You searched for: Descriptor "Network Traffic" Remove constraint Descriptor: "Network Traffic"
1,579 results on '"Network Traffic"'

Search Results

202. Evaluation of firewall performance when ranging a filtration rule set

203. What distinguishes binary from multi-class intrusion detection systems: Observations from experiments

204. A Network Traffic Abnormal Detection Method: Sketch-Based Profile Evolution

207. An Improvement Energy Consumption Policy Using Communication Reduction in Wireless Body Sensor Network.

208. Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.

209. Human-guided auto-labeling for network traffic data: The GELM approach.

210. Compare between PSO and artificial bee colony optimization algorithm in detecting DoS attacks from network traffic.

211. Unsupervised anomaly detection for network traffic using artificial immune network.

212. An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications.

213. A Novel Method for Improved Network Traffic Prediction Using Enhanced Deep Reinforcement Learning Algorithm.

214. IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency.

215. Network telescope: insights from a decade of observations.

216. Research and Application of Network Anomaly Traffic Detection System.

217. A novel framework for APT attack detection based on network traffic.

218. APPLICATION BASED PERFORMANCE MONITORING HEAVY DATA TRANSMISSION OF LOCAL AREA NETWORK.

219. Sustainable Energy Management in Intelligent Transportation.

220. Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network.

221. Apply machine learning techniques to detect malicious network traffic in cloud computing

222. Low Latency TOE with Double-Queue Structure for 10Gbps Ethernet on FPGA

223. Bot-DM: A dual-modal botnet detection method based on the combination of implicit semantic expression and graphical expression.

224. On time demand traffic estimation based on DBN with Horse herd optimization for next generation wireless network.

225. One-Class LSTM Network for Anomalous Network Traffic Detection.

226. A novel network traffic combination prediction model.

227. Multi-step network traffic prediction using echo state network with a selective error compensation strategy.

228. A Novel Traffic Based Framework for Smartphone Security Analysis.

229. Optimization of APT attack detection based on a model combining ATTENTION and deep learning.

230. Forecasting Network Interface Flow Using a Broad Learning System Based on the Sparrow Search Algorithm.

231. Performance Analysis of Network Traffic Intrusion Detection System Using Machine Learning Technique.

232. 基于 LMD 改进 GPR 优化的网络流量预测.

233. FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS CORRELATION WITH NETWORK SECURITY.

234. A SDN-Based Network Traffic Estimating Algorithm in Power Telecommunication Network

235. Network Traffic Model with Multi-fractal Discrete Wavelet Transform in Power Telecommunication Access Networks

236. A Linear Regression-Based Prediction Method to Traffic Flow for Low-Power WAN with Smart Electric Power Allocations

237. Self-similarity Analysis and Application of Network Traffic

238. Hybrid Deep Neural Network - Hidden Markov Model Based Network Traffic Classification

240. Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid

241. Anomaly-Based NIDS Using Artificial Neural Networks Optimised with Cuckoo Search Optimizer

242. Short-Term Time Series Modelling Forecasting Using Genetic Algorithm

243. Network Traffic Classification for Attack Detection Using Big Data Tools: A Review

246. Detection of RREQ Flooding Attacks in MANETs

247. Machine Learning Algorithm-Based Minimisation of Network Traffic in Mobile Cloud Computing

248. Statistical Distributions of Partial Correlators of Network Traffic Aggregated Packets for Distinguishing DDoS Attacks

249. Content Recognition of Network Traffic Using Wavelet Transform and CNN

250. Victimization analysis model of user network behavior based on network traffic

Catalog

Books, media, physical & digital resources