Works matching DE "DEEP packet inspection (Computer security)"
Results: 75
Integrating contextual intelligence with mixture of experts for signature and anomaly-based intrusion detection in CPS security.
- Published in:
- Neural Computing & Applications, 2025, v. 37, n. 8, p. 5991, doi. 10.1007/s00521-024-10967-9
- By:
- Publication type:
- Article
A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 40, p. 87903, doi. 10.1007/s11042-024-18845-1
- By:
- Publication type:
- Article
Software defined networking based network traffic classification using machine learning techniques.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70983-6
- By:
- Publication type:
- Article
Battle for digital customer ownership between the Telcos and Over-the-Top (OTT) players: Emerging markets perspective.
- Published in:
- African Journal of Science, Technology, Innovation & Development, 2022, v. 14, n. 2, p. 556, doi. 10.1080/20421338.2020.1866147
- By:
- Publication type:
- Article
Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection.
- Published in:
- Future Internet, 2024, v. 16, n. 12, p. 470, doi. 10.3390/fi16120470
- By:
- Publication type:
- Article
Acceptable Surveillance-Orientated Security Technologies: Insights from the SurPRISE Project.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 3/4, p. 437, doi. 10.24908/ss.v13i3/4.5400
- By:
- Publication type:
- Article
Policing the Network: Using DPI for Copyright Enforcement.
- Published in:
- Surveillance & Society, 2012, v. 9, n. 4, p. 348, doi. 10.24908/ss.v9i4.4340
- By:
- Publication type:
- Article
Cascaded classifier for improving traffic classification accuracy.
- Published in:
- IET Communications (Wiley-Blackwell), 2017, v. 11, n. 11, p. 1751, doi. 10.1049/iet-com.2017.0091
- By:
- Publication type:
- Article
Editorial: Heterogeneous Cloud-Based Intelligent Computing for Next-Generation 5G Applications.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1779, doi. 10.1007/s11036-022-02000-x
- By:
- Publication type:
- Article
Improved Flow Awareness Among Edge Nodes by Learning-Based Sampling in Software Defined Networks.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1867, doi. 10.1007/s11036-019-01402-8
- By:
- Publication type:
- Article
Deep RNN-Based Network Traffic Classification Scheme in Edge Computing System.
- Published in:
- Computer Science & Information Systems, 2022, v. 19, n. 1, p. 165, doi. 10.2298/CSIS200424038K
- By:
- Publication type:
- Article
Around the Circuit.
- Published in:
- Microwave Journal, 2023, v. 66, n. 1, p. 42
- By:
- Publication type:
- Article
A comprehensive survey on deep packet inspection for adva nced network traffic analysis: Issues and challenges.
- Published in:
- Nigde Omer Halisdemir University Journal of Engineering Sciences / Niğde Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi, 2023, v. 12, n. 1, p. 1, doi. 10.28948/ngmuh.1184020
- By:
- Publication type:
- Article
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 4, p. 373, doi. 10.22266/ijies2021.0831.33
- By:
- Publication type:
- Article
A feasibility study of stateful automaton packet inspection for streaming application detection systems.
- Published in:
- Enterprise Information Systems, 2017, v. 11, n. 9, p. 1317, doi. 10.1080/17517575.2016.1234070
- By:
- Publication type:
- Article
Reduction of Power Consumption for Pipelined DPI Systems on FPGA.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1395
- By:
- Publication type:
- Article
Reduced Power Consumption via Fewer Memory Accesses for Deep Packet Inspection.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 3, p. 819
- By:
- Publication type:
- Article
DEEP PACKET INSPECTION USING HYBRID CLASSIFIER FOR UNKNOWN TRAFFIC FLOWS IN THE INTERNET.
- Published in:
- ICTACT Journal on Communication Technology, 2021, v. 12, n. 1, p. 2239, doi. 10.21917/ijct.2021.0345
- By:
- Publication type:
- Article
A Hybrid CPU/GPU Pattern-Matching Algorithm for Deep Packet Inspection.
- Published in:
- PLoS ONE, 2015, v. 10, n. 10, p. 1, doi. 10.1371/journal.pone.0139301
- By:
- Publication type:
- Article
A Memory-Efficient Deterministic Finite Automaton-Based Bit-Split String Matching Scheme Using Pattern Uniqueness in Deep Packet Inspection.
- Published in:
- PLoS ONE, 2015, v. 10, n. 5, p. 1, doi. 10.1371/journal.pone.0126517
- By:
- Publication type:
- Article
Deep Pockets, Packets, and Harbors.
- Published in:
- Ohio State Law Journal, 2013, v. 74, n. 6, p. 1195
- By:
- Publication type:
- Article
Hybridization of Mean Shift Clustering and Deep Packet Inspected Classification for Network Traffic Analysis.
- Published in:
- Wireless Personal Communications, 2022, v. 127, n. 1, p. 217, doi. 10.1007/s11277-021-08208-6
- By:
- Publication type:
- Article
Deep Learning Approach for Encryption Techniques in Vehicular Networks.
- Published in:
- Wireless Personal Communications, 2022, v. 125, n. 1, p. 1, doi. 10.1007/s11277-022-09538-9
- By:
- Publication type:
- Article
Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure.
- Published in:
- Wireless Personal Communications, 2020, v. 115, n. 2, p. 993, doi. 10.1007/s11277-020-07608-4
- By:
- Publication type:
- Article
Unsupervised Detection and Clustering of Malicious TLS Flows.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3676692
- By:
- Publication type:
- Article
Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 8, p. 3804, doi. 10.3837/tiis.2018.08.014
- By:
- Publication type:
- Article
Institutional trustworthiness and national security governance: Evidence from six European countries.
- Published in:
- Governance, 2019, v. 32, n. 1, p. 103, doi. 10.1111/gove.12353
- By:
- Publication type:
- Article
Derin Paket İncelemesi için Önerilen Yeni Bir Örüntü Eşleştirme Algoritması.
- Published in:
- Duzce University Journal of Science & Technology, 2023, v. 11, n. 3, p. 1546, doi. 10.29130/dubited.1131544
- By:
- Publication type:
- Article
Research and implementation of traffic monitoring technology on S1 interface in LTE network.
- Published in:
- Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition), 2014, v. 26, n. 3, p. 292, doi. 10.3979/j.issn.1673-825X.2014.03.002
- By:
- Publication type:
- Article
How Humans Judge Machines.
- Published in:
- Science & Technology Studies, 2023, v. 36, n. 2, p. 81, doi. 10.23987/sts.114398
- By:
- Publication type:
- Article
İfade Özgürlüğü Açısından Ağ Tarafsızlığı Kavramı ve Türkiye'deki Hukuki Düzenlemeler ve Pratik Uygulamaları.
- Published in:
- Mülkiye Dergisi, 2013, v. 37, n. 3, p. 37
- By:
- Publication type:
- Article
A SURVEY ON WEB APPLICATION ATTACK DETECTION METHODS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 565, doi. 10.26483/ijarcs.v8i7.4220
- By:
- Publication type:
- Article
Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1345, doi. 10.32604/iasc.2022.020801
- By:
- Publication type:
- Article
AKER: An open-source security platform integrating IDS and SIEM functions with encrypted traffic analytic capability.
- Published in:
- Journal of Cyber Security Technology, 2022, v. 6, n. 1/2, p. 27, doi. 10.1080/23742917.2022.2058836
- By:
- Publication type:
- Article
An Agile Internet of Things (IoT) based Software Defined Network (SDN) Architecture.
- Published in:
- Egyptian Computer Science Journal, 2018, v. 42, n. 2, p. 13
- By:
- Publication type:
- Article
Design of an Efficient Forensic Layer for IoT Network Traffic Analysis Engine Using Deep Packet Inspection via Recurrent Neural Networks.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 3, p. 853, doi. 10.18280/ijsse.140317
- By:
- Publication type:
- Article
CUFTI: Methods for core users finding and traffic identification in P2P systems.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 2, p. 424, doi. 10.1007/s12083-015-0350-2
- By:
- Publication type:
- Article
Only Header: a reliable encrypted traffic classification framework without privacy risk.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 24, p. 13391, doi. 10.1007/s00500-022-07450-9
- By:
- Publication type:
- Article
A novel semi-supervised learning method for Internet application identification.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 8, p. 1963, doi. 10.1007/s00500-015-1892-1
- By:
- Publication type:
- Article
Deep Packet Inspection Model Based on Support Vector Machine for Anomaly Detection in Local Area Networks.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2024, v. 50, n. 2, p. 8, doi. 10.25195/ijci.v50i2.501
- By:
- Publication type:
- Article
Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142184
- By:
- Publication type:
- Article
Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 12, p. 1376, doi. 10.3390/electronics10121376
- By:
- Publication type:
- Article
Internet Traffic Classification with Federated Learning.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 1, p. 27, doi. 10.3390/electronics10010027
- By:
- Publication type:
- Article
Fast Packet Inspection for End-To-End Encryption.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1937, doi. 10.3390/electronics9111937
- By:
- Publication type:
- Article
A Technical Survey on Intelligent Optimization Grouping Algorithms for Finite State Automata in Deep Packet Inspection.
- Published in:
- Archives of Computational Methods in Engineering, 2021, v. 28, n. 3, p. 1371, doi. 10.1007/s11831-020-09419-z
- By:
- Publication type:
- Article
Research on dispatching and management model based on safe performance interface.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 908, doi. 10.3969/j.issn.1001-3695.2014.03.065
- By:
- Publication type:
- Article
Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 14, p. 8104, doi. 10.3390/app13148104
- By:
- Publication type:
- Article
SRP: A Microscopic Look at the Composition Mechanism of Website Fingerprinting.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7937, doi. 10.3390/app12157937
- By:
- Publication type:
- Article
Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection.
- Published in:
- Applied Sciences (2076-3417), 2017, v. 7, n. 10, p. 1082, doi. 10.3390/app7101082
- By:
- Publication type:
- Article
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 5, p. 475, doi. 10.1007/s10207-016-0344-y
- By:
- Publication type:
- Article