Search

Your search keyword '"Network traffic analysis"' showing total 434 results

Search Constraints

Start Over You searched for: Descriptor "Network traffic analysis" Remove constraint Descriptor: "Network traffic analysis"
434 results on '"Network traffic analysis"'

Search Results

2. Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS

3. Developing information technology for evaluating and enhancing application-layer DDoS attack detection methods

4. A scalable data acquisition system for the efficient processing of DNS network traffic.

5. DEVELOPING INFORMATION TECHNOLOGY FOR EVALUATING AND ENHANCING APPLICATION-LAYER DDOS ATTACK DETECTION METHODS.

6. Third-Party Data Leaks on Municipal Websites

8. AI Enhanced Cyber Security Methods for Anomaly Detection

9. Identify Users on Dating Applications: A Forensic Perspective

11. Using Multivariate Heuristic Analysis for Detecting Attacks in Website Log Files: A Formulaic Approach

13. Several Online Pharmacies Leak Sensitive Health Data to Third Parties

14. Adversarial Example Attacks and Defenses in DNS Data Exfiltration

17. QUIC website fingerprinting based on automated machine learning

18. ITC-Net-blend-60: a comprehensive dataset for robust network traffic classification in diverse environments

19. Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

20. ITC-Net-blend-60: a comprehensive dataset for robust network traffic classification in diverse environments.

21. Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.

24. BotDefender: A Collaborative Defense Framework Against Botnet Attacks using Network Traffic Analysis and Machine Learning.

26. Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection.

27. ЗАСТОСУВАННЯ МЕТОДУ ШТУЧНОГО ІНТЕЛЕКТУ ДЛЯ АНАЛІЗУ ШКІДЛИВОГО МЕРЕЖЕВОГО ТРАФІКУ НА КАНАЛЬНОМУ РІВНІ (ARP-атаки)

28. Autonomous machine learning for early bot detection in the internet of things

29. Measuring Latency-Accuracy Trade-Offs in Convolutional Neural Networks

30. Autoencoder-Based Botnet Detection for Enhanced IoT Security

31. An integrated optimization model of network behavior victimization identification based on association rule feature extraction

32. Derin Paket İncelemesi için Önerilen Yeni Bir Örüntü Eşleştirme Algoritması

33. Network traffic reduction with spatially flexible optical networks using machine learning techniques.

34. Methods and High-performance Tools for Collecting, Analysis and Visualization of Data Exchange with a Focus on Research and Education Telecommunications Networks.

35. MisplaceX: A System for IT Device Detection and Monitoring System in Office Environments.

36. Deep Neural Decision Forest (DNDF): A Novel Approach for Enhancing Intrusion Detection Systems in Network Traffic Analysis.

37. Anomaly detection in network traffic using entropy-based methods: application to various types of cyberattacks.

38. Network-based advanced malware detection using multi-classifier machine learning

39. User profiling based on network application traffic monitoring

40. An Analysis of Temporal Features in Multivariate Time Series to Forecast Network Events.

41. 基于关联规则特征提取的网络行为被害性识别集成优化模型.

42. Traffic Management in IoT Backbone Networks Using GNN and MAB with SDN Orchestration.

43. Derin Paket İncelemesi için Önerilen Yeni Bir Örüntü Eşleştirme Algoritması.

44. Toward Early and Accurate Network Intrusion Detection Using Graph Embedding.

45. Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach

47. Network Anomaly Detection Based on Sparse Representation and Incoherent Dictionary Learning

48. Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications

49. Android Botnet Detection Based on Network Analysis Using Machine Learning Algorithm

Catalog

Books, media, physical & digital resources