Works matching DE "DEEP packet inspection (Computer security)"
Results: 76
Applications Classification of VPN Encryption Tunnel Based on SAE-2dCNN Model.
- Published in:
- Journal of Artificial Intelligence (2579-0021), 2022, v. 4, n. 3, p. 133, doi. 10.32604/jai.2022.031800
- By:
- Publication type:
- Article
Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection.
- Published in:
- Future Internet, 2024, v. 16, n. 12, p. 470, doi. 10.3390/fi16120470
- By:
- Publication type:
- Article
Superboat launch for Johnson & Allen's new premises.
- Published in:
- Insight: Non-Destructive Testing & Condition Monitoring, 2013, p. 1
- Publication type:
- Article
How Humans Judge Machines.
- Published in:
- Science & Technology Studies, 2023, v. 36, n. 2, p. 81, doi. 10.23987/sts.114398
- By:
- Publication type:
- Article
An Agile Internet of Things (IoT) based Software Defined Network (SDN) Architecture.
- Published in:
- Egyptian Computer Science Journal, 2018, v. 42, n. 2, p. 13
- By:
- Publication type:
- Article
Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection.
- Published in:
- Applied Sciences (2076-3417), 2017, v. 7, n. 10, p. 1082, doi. 10.3390/app7101082
- By:
- Publication type:
- Article
Cost-based placement of vDPI functions in NFV infrastructures.
- Published in:
- International Journal of Network Management, 2015, v. 25, n. 6, p. 490, doi. 10.1002/nem.1920
- By:
- Publication type:
- Article
Editorial: Heterogeneous Cloud-Based Intelligent Computing for Next-Generation 5G Applications.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1779, doi. 10.1007/s11036-022-02000-x
- By:
- Publication type:
- Article
Improved Flow Awareness Among Edge Nodes by Learning-Based Sampling in Software Defined Networks.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1867, doi. 10.1007/s11036-019-01402-8
- By:
- Publication type:
- Article
Hybridization of Mean Shift Clustering and Deep Packet Inspected Classification for Network Traffic Analysis.
- Published in:
- Wireless Personal Communications, 2022, v. 127, n. 1, p. 217, doi. 10.1007/s11277-021-08208-6
- By:
- Publication type:
- Article
Deep Learning Approach for Encryption Techniques in Vehicular Networks.
- Published in:
- Wireless Personal Communications, 2022, v. 125, n. 1, p. 1, doi. 10.1007/s11277-022-09538-9
- By:
- Publication type:
- Article
Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure.
- Published in:
- Wireless Personal Communications, 2020, v. 115, n. 2, p. 993, doi. 10.1007/s11277-020-07608-4
- By:
- Publication type:
- Article
Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 14, p. 8104, doi. 10.3390/app13148104
- By:
- Publication type:
- Article
SRP: A Microscopic Look at the Composition Mechanism of Website Fingerprinting.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7937, doi. 10.3390/app12157937
- By:
- Publication type:
- Article
Battle for digital customer ownership between the Telcos and Over-the-Top (OTT) players: Emerging markets perspective.
- Published in:
- African Journal of Science, Technology, Innovation & Development, 2022, v. 14, n. 2, p. 556, doi. 10.1080/20421338.2020.1866147
- By:
- Publication type:
- Article
Content-based deep communication control for networked control system.
- Published in:
- Telecommunication Systems, 2017, v. 65, n. 1, p. 155, doi. 10.1007/s11235-016-0223-x
- By:
- Publication type:
- Article
Unsupervised Detection and Clustering of Malicious TLS Flows.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3676692
- By:
- Publication type:
- Article
Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 8, p. 3804, doi. 10.3837/tiis.2018.08.014
- By:
- Publication type:
- Article
A new trust-based mechanism for detecting intrusions in MANET.
- Published in:
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 4, p. 153, doi. 10.1080/19393555.2017.1328544
- By:
- Publication type:
- Article
Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1345, doi. 10.32604/iasc.2022.020801
- By:
- Publication type:
- Article
Cascaded classifier for improving traffic classification accuracy.
- Published in:
- IET Communications (Wiley-Blackwell), 2017, v. 11, n. 11, p. 1751, doi. 10.1049/iet-com.2017.0091
- By:
- Publication type:
- Article
China, Africa, and the future of the Internet: By Iginio Gagliardone London, Zed Books, 2019, ix + 193 pp, $21.95 (paperback), ISBN 9781783605224, $95 (hardback), ISBN 9781783605231.
- Published in:
- 2022
- By:
- Publication type:
- Book Review
Elephant Flows Detection Using Deep Neural Network, Convolutional Neural Network, Long Short-Term Memory, and Autoencoder.
- Published in:
- Journal of Computer Networks & Communications, 2023, p. 1, doi. 10.1155/2023/1495642
- By:
- Publication type:
- Article
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 5, p. 475, doi. 10.1007/s10207-016-0344-y
- By:
- Publication type:
- Article
Autonomous Attack Mitigation Through Firewall Reconfiguration.
- Published in:
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2307
- By:
- Publication type:
- Article
Editorial for special issue on selected papers from 23rd edition of the Brazilian Workshop on Network and Service Management (WGRS).
- Published in:
- International Journal of Network Management, 2021, v. 31, n. 5, p. 1, doi. 10.1002/nem.2151
- By:
- Publication type:
- Article
Application layer classification of Internet traffic using ensemble learning models.
- Published in:
- International Journal of Network Management, 2021, v. 31, n. 4, p. 1, doi. 10.1002/nem.2147
- By:
- Publication type:
- Article
Length-Bounded Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet Inspection.
- Published in:
- Algorithms, 2017, v. 10, n. 1, p. 16, doi. 10.3390/a10010016
- By:
- Publication type:
- Article
Integrating contextual intelligence with mixture of experts for signature and anomaly-based intrusion detection in CPS security.
- Published in:
- Neural Computing & Applications, 2025, v. 37, n. 8, p. 5991, doi. 10.1007/s00521-024-10967-9
- By:
- Publication type:
- Article
Institutional trustworthiness and national security governance: Evidence from six European countries.
- Published in:
- Governance, 2019, v. 32, n. 1, p. 103, doi. 10.1111/gove.12353
- By:
- Publication type:
- Article
Deep Pockets, Packets, and Harbors.
- Published in:
- Ohio State Law Journal, 2013, v. 74, n. 6, p. 1195
- By:
- Publication type:
- Article
A comprehensive survey on deep packet inspection for adva nced network traffic analysis: Issues and challenges.
- Published in:
- Nigde Omer Halisdemir University Journal of Engineering Sciences / Niğde Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi, 2023, v. 12, n. 1, p. 1, doi. 10.28948/ngmuh.1184020
- By:
- Publication type:
- Article
Derin Paket İncelemesi için Önerilen Yeni Bir Örüntü Eşleştirme Algoritması.
- Published in:
- Duzce University Journal of Science & Technology, 2023, v. 11, n. 3, p. 1546, doi. 10.29130/dubited.1131544
- By:
- Publication type:
- Article
Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142184
- By:
- Publication type:
- Article
Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 12, p. 1376, doi. 10.3390/electronics10121376
- By:
- Publication type:
- Article
Internet Traffic Classification with Federated Learning.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 1, p. 27, doi. 10.3390/electronics10010027
- By:
- Publication type:
- Article
Fast Packet Inspection for End-To-End Encryption.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1937, doi. 10.3390/electronics9111937
- By:
- Publication type:
- Article
Application-protocol based Intrusion Detection System.
- Published in:
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- By:
- Publication type:
- Article
TCN enhanced novel malicious traffic detection for IoT devices.
- Published in:
- Connection Science, 2022, v. 34, n. 1, p. 1322, doi. 10.1080/09540091.2022.2067124
- By:
- Publication type:
- Article
TCN enhanced novel malicious traffic detection for IoT devices.
- Published in:
- Connection Science, 2022, v. 34, n. 1, p. 1322, doi. 10.1080/09540091.2022.2067124
- By:
- Publication type:
- Article
Exploring efficient grouping algorithms in regular expression matching.
- Published in:
- PLoS ONE, 2018, v. 13, n. 10, p. 1, doi. 10.1371/journal.pone.0206068
- By:
- Publication type:
- Article
An Autonomic Traffic Classification System for Network Operation and Management.
- Published in:
- Journal of Network & Systems Management, 2015, v. 23, n. 3, p. 401, doi. 10.1007/s10922-013-9293-1
- By:
- Publication type:
- Article
Acceptable Surveillance-Orientated Security Technologies: Insights from the SurPRISE Project.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 3/4, p. 437, doi. 10.24908/ss.v13i3/4.5400
- By:
- Publication type:
- Article
Policing the Network: Using DPI for Copyright Enforcement.
- Published in:
- Surveillance & Society, 2012, v. 9, n. 4, p. 348, doi. 10.24908/ss.v9i4.4340
- By:
- Publication type:
- Article
Around the Circuit.
- Published in:
- Microwave Journal, 2023, v. 66, n. 1, p. 42
- By:
- Publication type:
- Article
Research on dispatching and management model based on safe performance interface.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 908, doi. 10.3969/j.issn.1001-3695.2014.03.065
- By:
- Publication type:
- Article
Encrypted Packet Inspection Based on Oblivious Transfer.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4743078
- By:
- Publication type:
- Article
Design of an Efficient Forensic Layer for IoT Network Traffic Analysis Engine Using Deep Packet Inspection via Recurrent Neural Networks.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 3, p. 853, doi. 10.18280/ijsse.140317
- By:
- Publication type:
- Article
CUFTI: Methods for core users finding and traffic identification in P2P systems.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 2, p. 424, doi. 10.1007/s12083-015-0350-2
- By:
- Publication type:
- Article
Deep Packet Inspection Model Based on Support Vector Machine for Anomaly Detection in Local Area Networks.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2024, v. 50, n. 2, p. 8, doi. 10.25195/ijci.v50i2.501
- By:
- Publication type:
- Article