Search

Your search keyword '"Network Traffic"' showing total 1,579 results

Search Constraints

Start Over You searched for: Descriptor "Network Traffic" Remove constraint Descriptor: "Network Traffic"
1,579 results on '"Network Traffic"'

Search Results

2. Performance Analysis of Anomaly-Based Network Intrusion Detection Using Feature Selection and Machine Learning Techniques.

3. An Approach for Anomaly Detection in Network Communications Using k-Path Analysis.

4. Analysis of Ethernet Traffic Patterns on NTP Servers at CSIR NPL.

5. An Approach for Anomaly Detection in Network Communications Using k-Path Analysis

6. Network traffic prediction model based on linear and nonlinear model combination

7. Unveiling Malicious Network Flows Using Benford's Law.

8. NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble.

9. Enhancing data protection with a distributed storage system based on the redundant residue number system.

10. Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices.

11. RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing.

12. Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory.

13. MATHEMATICAL MODEL AND STRUCTURE OF A NEURAL NETWORK FOR DETECTION OF CYBER ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS.

14. Integration of simulated annealing into pigeon inspired optimizer algorithm for feature selection in network intrusion detection systems.

15. THE EFFECT OF NOISE ON RECURRENT DIAGRAMS OF ENERGY CONSUMPTION OF A METALLURGICAL ENTERPRISE.

16. Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification.

17. MATHEMATICAL MODEL AND STRUCTURE OF A NEURAL NETWORK FOR DETECTION OF CYBER ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS

18. Unveiling Risks and Challenges: The Attention Economy and China’s Tourism Cultural and Creative Innovations

19. Early Detection and Classification of Zero-Day Attacks in Network Traffic Using Convolutional Neural Network

21. Unveiling the Unseen: Video Recognition Attacks on Social Software

22. A Cost-Sensitive Sparse Auto-encoder Based Feature Extraction for Network Traffic Classification Using CNN

23. Towards a Supervised Machine Learning Algorithm for Cyberattacks Detection and Prevention in a Smart Grid Cybersecurity System

24. ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach

26. Cyber-Attacks and Anomaly Detection in Networking Based on Deep Learning—A Survey

27. IPAssess: A Protocol-Based Fingerprinting Model for Device Identification in the IoT

28. Approach on Machine Learning Techniques for Anomaly-Based Web Intrusion Detection Systems: Using CICIDS2017 Dataset

30. Reducing DNS Traffic to Enhance Home IoT Device Privacy.

31. Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN.

32. Integration of Telkom ISP and 3 LTE Using PCC Method to Improve Internet Connection Stability.

33. Time‐based DDoS attack detection through hybrid LSTM‐CNN model architectures: An investigation of many‐to‐one and many‐to‐many approaches.

34. Forecasting of mobile network traffic and spatio–temporal analysis using modLSTM.

35. Modelling an Improved Swarm Optimizer and Boosted Quantile Estimator For Malicious Flow Monitoring And Prediction In Network.

36. ANOMALY DETECTION SYSTEM FOR NETWORK TRANSPORT WITH MACHINE LEARNING APPROACH.

37. Integration of simulated annealing into pigeon inspired optimizer algorithm for feature selection in network intrusion detection systems

38. Security Information Event Management data acquisition and analysis methods with machine learning principles

39. Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature

40. Enhancing Network Traffic Anomaly Detection: Leveraging Temporal Correlation Index in a Hybrid Framework

41. A Human-in-the-Loop Anomaly Detection Architecture for Big Traffic Data of Cellular Network

42. Evaluation of firewall performance metrics with ranging the rules for Poisson incoming packet flow and exponential filtering time

45. Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature.

46. Evaluating Machine Learning and Deep Learning Models for Enhanced DDoS Attack Detection.

47. A Stacked Ensemble Model to Detect Network Intrusions.

48. ASSESSMENT OF QOS INDICATORS OF A NETWORK WITH UDP AND TCP TRAFFIC UNDER A NODE PEAK LOAD MODE.

49. Enhancing Network Security: A Novel Hybrid ML Approach for DDoS Attack Detection.

50. DETECTION OF OPERATING SYSTEM VULNERABILITIES AND NETWORK TRAFFIC ANALYSIS METHODS.

Catalog

Books, media, physical & digital resources