Works matching DE "DEEP packet inspection (Computer security)"
Results: 73
Deep Packet Inspection Model Based on Support Vector Machine for Anomaly Detection in Local Area Networks.
- Published in:
- Iraqi Journal for Computers & Informatics Ijci, 2024, v. 50, n. 2, p. 8, doi. 10.25195/ijci.v50i2.501
- By:
- Publication type:
- Article
Reduction of Power Consumption for Pipelined DPI Systems on FPGA.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1395
- By:
- Publication type:
- Article
Reduced Power Consumption via Fewer Memory Accesses for Deep Packet Inspection.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 3, p. 819
- By:
- Publication type:
- Article
China, Africa, and the future of the Internet: By Iginio Gagliardone London, Zed Books, 2019, ix + 193 pp, $21.95 (paperback), ISBN 9781783605224, $95 (hardback), ISBN 9781783605231.
- Published in:
- 2022
- By:
- Publication type:
- Book Review
Cost-based placement of vDPI functions in NFV infrastructures.
- Published in:
- International Journal of Network Management, 2015, v. 25, n. 6, p. 490, doi. 10.1002/nem.1920
- By:
- Publication type:
- Article
Content-based deep communication control for networked control system.
- Published in:
- Telecommunication Systems, 2017, v. 65, n. 1, p. 155, doi. 10.1007/s11235-016-0223-x
- By:
- Publication type:
- Article
Design of an Efficient Forensic Layer for IoT Network Traffic Analysis Engine Using Deep Packet Inspection via Recurrent Neural Networks.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 3, p. 853, doi. 10.18280/ijsse.140317
- By:
- Publication type:
- Article
A Technical Survey on Intelligent Optimization Grouping Algorithms for Finite State Automata in Deep Packet Inspection.
- Published in:
- Archives of Computational Methods in Engineering, 2021, v. 28, n. 3, p. 1371, doi. 10.1007/s11831-020-09419-z
- By:
- Publication type:
- Article
DEEP PACKET INSPECTION USING HYBRID CLASSIFIER FOR UNKNOWN TRAFFIC FLOWS IN THE INTERNET.
- Published in:
- ICTACT Journal on Communication Technology, 2021, v. 12, n. 1, p. 2239, doi. 10.21917/ijct.2021.0345
- By:
- Publication type:
- Article
Detecting zero-day attacks using context-aware anomaly detection at the application-layer.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 5, p. 475, doi. 10.1007/s10207-016-0344-y
- By:
- Publication type:
- Article
FILE DETECTION ON NETWORK TRAFFIC USING APPROXIMATE MATCHING.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 23
- By:
- Publication type:
- Article
Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1345, doi. 10.32604/iasc.2022.020801
- By:
- Publication type:
- Article
A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 40, p. 87903, doi. 10.1007/s11042-024-18845-1
- By:
- Publication type:
- Article
An improved method in deep packet inspection based on regular expression.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 6, p. 3317, doi. 10.1007/s11227-018-2517-0
- By:
- Publication type:
- Article
Applications Classification of VPN Encryption Tunnel Based on SAE-2dCNN Model.
- Published in:
- Journal of Artificial Intelligence (2579-0021), 2022, v. 4, n. 3, p. 133, doi. 10.32604/jai.2022.031800
- By:
- Publication type:
- Article
AKER: An open-source security platform integrating IDS and SIEM functions with encrypted traffic analytic capability.
- Published in:
- Journal of Cyber Security Technology, 2022, v. 6, n. 1/2, p. 27, doi. 10.1080/23742917.2022.2058836
- By:
- Publication type:
- Article
An Agile Internet of Things (IoT) based Software Defined Network (SDN) Architecture.
- Published in:
- Egyptian Computer Science Journal, 2018, v. 42, n. 2, p. 13
- By:
- Publication type:
- Article
Research on dispatching and management model based on safe performance interface.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 908, doi. 10.3969/j.issn.1001-3695.2014.03.065
- By:
- Publication type:
- Article
Institutional trustworthiness and national security governance: Evidence from six European countries.
- Published in:
- Governance, 2019, v. 32, n. 1, p. 103, doi. 10.1111/gove.12353
- By:
- Publication type:
- Article
A new trust-based mechanism for detecting intrusions in MANET.
- Published in:
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 4, p. 153, doi. 10.1080/19393555.2017.1328544
- By:
- Publication type:
- Article
Leveraging Network Slicing in SDNs for Handling Application Failures.
- Published in:
- IAENG International Journal of Computer Science, 2024, v. 51, n. 4, p. 409
- By:
- Publication type:
- Article
Machine Learning-Based Traffic Classification in Software-Defined Networking: A Systematic Literature Review, Challenges, and Future Research Directions.
- Published in:
- IAENG International Journal of Computer Science, 2022, v. 49, n. 4, p. 1002
- By:
- Publication type:
- Article
Only Header: a reliable encrypted traffic classification framework without privacy risk.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 24, p. 13391, doi. 10.1007/s00500-022-07450-9
- By:
- Publication type:
- Article
A novel semi-supervised learning method for Internet application identification.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 8, p. 1963, doi. 10.1007/s00500-015-1892-1
- By:
- Publication type:
- Article
Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 14, p. 8104, doi. 10.3390/app13148104
- By:
- Publication type:
- Article
SRP: A Microscopic Look at the Composition Mechanism of Website Fingerprinting.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7937, doi. 10.3390/app12157937
- By:
- Publication type:
- Article
Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection.
- Published in:
- Applied Sciences (2076-3417), 2017, v. 7, n. 10, p. 1082, doi. 10.3390/app7101082
- By:
- Publication type:
- Article
TCN enhanced novel malicious traffic detection for IoT devices.
- Published in:
- Connection Science, 2022, v. 34, n. 1, p. 1322, doi. 10.1080/09540091.2022.2067124
- By:
- Publication type:
- Article
TCN enhanced novel malicious traffic detection for IoT devices.
- Published in:
- Connection Science, 2022, v. 34, n. 1, p. 1322, doi. 10.1080/09540091.2022.2067124
- By:
- Publication type:
- Article
Unsupervised Detection and Clustering of Malicious TLS Flows.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3676692
- By:
- Publication type:
- Article
Encrypted Packet Inspection Based on Oblivious Transfer.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4743078
- By:
- Publication type:
- Article
A SURVEY ON WEB APPLICATION ATTACK DETECTION METHODS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 565, doi. 10.26483/ijarcs.v8i7.4220
- By:
- Publication type:
- Article
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 3, p. 898, doi. 10.3390/s24030898
- By:
- Publication type:
- Article
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware †.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 4, p. 1140, doi. 10.3390/s21041140
- By:
- Publication type:
- Article
Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection.
- Published in:
- Future Internet, 2024, v. 16, n. 12, p. 470, doi. 10.3390/fi16120470
- By:
- Publication type:
- Article
Deep RNN-Based Network Traffic Classification Scheme in Edge Computing System.
- Published in:
- Computer Science & Information Systems, 2022, v. 19, n. 1, p. 165, doi. 10.2298/CSIS200424038K
- By:
- Publication type:
- Article
Classification of Network Traffic Using Supervised Machine Learning Algorithms Within NFV Environment.
- Published in:
- Serbian Journal of Electrical Engineering, 2021, v. 18, n. 2, p. 237, doi. 10.2298/SJEE2102237I
- By:
- Publication type:
- Article
Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 8, p. 3804, doi. 10.3837/tiis.2018.08.014
- By:
- Publication type:
- Article
Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142184
- By:
- Publication type:
- Article
Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 12, p. 1376, doi. 10.3390/electronics10121376
- By:
- Publication type:
- Article
Internet Traffic Classification with Federated Learning.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 1, p. 27, doi. 10.3390/electronics10010027
- By:
- Publication type:
- Article
Fast Packet Inspection for End-To-End Encryption.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1937, doi. 10.3390/electronics9111937
- By:
- Publication type:
- Article
Elephant Flows Detection Using Deep Neural Network, Convolutional Neural Network, Long Short-Term Memory, and Autoencoder.
- Published in:
- Journal of Computer Networks & Communications, 2023, p. 1, doi. 10.1155/2023/1495642
- By:
- Publication type:
- Article
Editorial for special issue on selected papers from 23rd edition of the Brazilian Workshop on Network and Service Management (WGRS).
- Published in:
- International Journal of Network Management, 2021, v. 31, n. 5, p. 1, doi. 10.1002/nem.2151
- By:
- Publication type:
- Article
Application layer classification of Internet traffic using ensemble learning models.
- Published in:
- International Journal of Network Management, 2021, v. 31, n. 4, p. 1, doi. 10.1002/nem.2147
- By:
- Publication type:
- Article
A Memory-Efficient Deterministic Finite Automaton-Based Bit-Split String Matching Scheme Using Pattern Uniqueness in Deep Packet Inspection.
- Published in:
- PLoS ONE, 2015, v. 10, n. 5, p. 1, doi. 10.1371/journal.pone.0126517
- By:
- Publication type:
- Article
An Autonomic Traffic Classification System for Network Operation and Management.
- Published in:
- Journal of Network & Systems Management, 2015, v. 23, n. 3, p. 401, doi. 10.1007/s10922-013-9293-1
- By:
- Publication type:
- Article
Detection of Hacker Intention Using Deep Packet Inspection.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 4, p. 794, doi. 10.3390/jcp4040037
- By:
- Publication type:
- Article
Software defined networking based network traffic classification using machine learning techniques.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70983-6
- By:
- Publication type:
- Article
Application-protocol based Intrusion Detection System.
- Published in:
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- By:
- Publication type:
- Article