Works about COMPUTER network traffic
Results: 896
Analysis of atmospheric attenuation of a FSO–WDM system for long-range communication.
- Published in:
- Journal of Optical Communications, 2024, v. 45, n. 1, p. s2059, doi. 10.1515/joc-2023-0157
- By:
- Publication type:
- Article
A Comprehensive Survey of Recent Proposed Content Replacement Strategies for Cooperative Edge Caching in IoT.
- Published in:
- Majlesi Journal of Telecommunication Devices, 2024, v. 13, n. 4, p. 191, doi. 10.71822/mjtd.2024.1126829
- By:
- Publication type:
- Article
Staying Safe Online: A Guide to Cyber Security.
- Published in:
- British Dental Nurses Journal, 2025, v. 88, n. 1, p. 28
- Publication type:
- Article
Bag2image: a multi-instance network traffic representation for network security event prediction.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00292-y
- By:
- Publication type:
- Article
Deep Learning vs. Machine Learning for Intrusion Detection in Computer Networks: A Comparative Study.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 1903, doi. 10.3390/app15041903
- By:
- Publication type:
- Article
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 3179, doi. 10.32604/cmc.2024.059688
- By:
- Publication type:
- Article
Multi-Head Attention Enhanced Parallel Dilated Convolution and Residual Learning for Network Traffic Anomaly Detection.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2159, doi. 10.32604/cmc.2024.058396
- By:
- Publication type:
- Article
ADVANCED HYBRID GENERATIVE AI MODELS FOR MULTI-LAYERED DETECTION AND DEFENSE AGAINST DDOS ATTACKS.
- Published in:
- ICTACT Journal on Soft Computing, 2025, v. 15, n. 3, p. 3618, doi. 10.21917/ijsc.2025.0502
- By:
- Publication type:
- Article
Research on an Efficient Network Advanced Orbiting Systems Comprehensive Multiplexing Algorithm Based on Elastic Time Slots.
- Published in:
- Aerospace (MDPI Publishing), 2025, v. 12, n. 2, p. 155, doi. 10.3390/aerospace12020155
- By:
- Publication type:
- Article
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting.
- Published in:
- Scientific Data, 2025, v. 12, n. 1, p. 1, doi. 10.1038/s41597-025-04603-x
- By:
- Publication type:
- Article
Hybrid GAN-LSTM for Enhancing DDoS Detection on Imbalance Dataset.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 189, doi. 10.18280/ijsse.150120
- By:
- Publication type:
- Article
TOCA-IoT: Threshold Optimization and Causal Analysis for IoT Network Anomaly Detection Based on Explainable Random Forest.
- Published in:
- Algorithms, 2025, v. 18, n. 2, p. 117, doi. 10.3390/a18020117
- By:
- Publication type:
- Article
Enhanced Hybrid Deep Learning Models-Based Anomaly Detection Method for Two-Stage Binary and Multi-Class Classification of Attacks in Intrusion Detection Systems.
- Published in:
- Algorithms, 2025, v. 18, n. 2, p. 69, doi. 10.3390/a18020069
- By:
- Publication type:
- Article
MTL-DoHTA: Multi-Task Learning-Based DNS over HTTPS Traffic Analysis for Enhanced Network Security.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 993, doi. 10.3390/s25040993
- By:
- Publication type:
- Article
From network traffic data to business activities: a conceptualization and a recognition approach.
- Published in:
- Software & Systems Modeling, 2023, v. 22, n. 6, p. 1827, doi. 10.1007/s10270-023-01135-z
- By:
- Publication type:
- Article
Predictive resource allocation and VNF deployment using ensemble learning.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 34, p. 80641, doi. 10.1007/s11042-024-18673-3
- By:
- Publication type:
- Article
Resource allocation problem and artificial intelligence: the state-of-the-art review (2009–2023) and open research challenges.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 26, p. 67953, doi. 10.1007/s11042-024-18123-0
- By:
- Publication type:
- Article
An optimized intrusion detection model for wireless sensor networks based on MLP-CatBoost algorithm.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 25, p. 66725, doi. 10.1007/s11042-023-18034-6
- By:
- Publication type:
- Article
SD-IIDS: intelligent intrusion detection system for software-defined networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 11077, doi. 10.1007/s11042-023-15725-y
- By:
- Publication type:
- Article
ROUTING STRATEGIES FOR SUPPRESSING TRAFFIC-DRIVEN EPIDEMIC SPREADING IN MULTIPLEX NETWORKS.
- Published in:
- Advances in Complex Systems, 2023, v. 26, n. 6, p. 1, doi. 10.1142/S0219525923400052
- By:
- Publication type:
- Article
An Empirical Investigation in Turkish Mobile Network Market.
- Published in:
- Current Perspectives in Social Sciences, 2024, v. 28, n. 1, p. 23, doi. 10.53487/atasobed.1454526
- By:
- Publication type:
- Article
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 528, doi. 10.1049/ntw2.12135
- By:
- Publication type:
- Article
Enhanced multivariate singular spectrum analysis‐based network traffic forecasting for real time industrial IoT applications.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 4, p. 301, doi. 10.1049/ntw2.12121
- By:
- Publication type:
- Article
Digital methods for sensory media research: Toolmaking as a critical technical practice.
- Published in:
- Convergence: The Journal of Research into New Media Technologies, 2024, v. 30, n. 1, p. 236, doi. 10.1177/13548565241226791
- By:
- Publication type:
- Article
Survey of Task Offloading Technology in Cloud-Edge Resource Collaboration.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2023, v. 17, n. 10, p. 2325, doi. 10.3778/j.issn.1673-9418.2303042
- By:
- Publication type:
- Article
Event Notes.
- Published in:
- 2024
- Publication type:
- Calendar
CESNET-TLS-Year22: A year-spanning TLS network traffic dataset from backbone lines.
- Published in:
- Scientific Data, 2024, v. 11, n. 1, p. 1, doi. 10.1038/s41597-024-03927-4
- By:
- Publication type:
- Article
Author Correction: CESNET-TLS-Year22: A year-spanning TLS network traffic dataset from backbone lines.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
CESNET-TLS-Year22: A year-spanning TLS network traffic dataset from backbone lines.
- Published in:
- Scientific Data, 2024, v. 11, n. 1, p. 1, doi. 10.1038/s41597-024-03927-4
- By:
- Publication type:
- Article
CESNET-TLS-Year22: A year-spanning TLS network traffic dataset from backbone lines.
- Published in:
- Scientific Data, 2024, v. 11, n. 1, p. 1, doi. 10.1038/s41597-024-03927-4
- By:
- Publication type:
- Article
A Hierarchical Machine Learning Method for Detection and Visualization of Network Intrusions from Big Data.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 10, p. 204, doi. 10.3390/technologies12100204
- By:
- Publication type:
- Article
Optimizing Cyber Threat Detection in IoT: A Study of Artificial Bee Colony (ABC)-Based Hyperparameter Tuning for Machine Learning.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 10, p. 181, doi. 10.3390/technologies12100181
- By:
- Publication type:
- Article
On the Integration of Standard Deviation and Clustering to Promote Scalable and Precise Wi-Fi Round-Trip Time Positioning.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 10, p. 172, doi. 10.3390/technologies12100172
- By:
- Publication type:
- Article
iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 8, p. 122, doi. 10.3390/technologies12080122
- By:
- Publication type:
- Article
Analysis of the Use of Artificial Intelligence in Software-Defined Intelligent Networks: A Survey.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 7, p. 99, doi. 10.3390/technologies12070099
- By:
- Publication type:
- Article
Behind the Door: Practical Parameterization of Propagation Parameters for IEEE 802.11ad Use Cases.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 6, p. 85, doi. 10.3390/technologies12060085
- By:
- Publication type:
- Article
Multistage Malware Detection Method for Backup Systems.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 2, p. 23, doi. 10.3390/technologies12020023
- By:
- Publication type:
- Article
Efficient and Secure Traffic Scheduling Based on Private Sketch.
- Published in:
- Mathematics (2227-7390), 2025, v. 13, n. 2, p. 288, doi. 10.3390/math13020288
- By:
- Publication type:
- Article
Intelligent Reflecting Surface-Assisted Wireless Communication Using RNNs: Comprehensive Insights.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 19, p. 2973, doi. 10.3390/math12192973
- By:
- Publication type:
- Article
Unveiling Malicious Network Flows Using Benford's Law.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 15, p. 2299, doi. 10.3390/math12152299
- By:
- Publication type:
- Article
Adaptive Graph Attention and Long Short-Term Memory-Based Networks for Traffic Prediction.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 2, p. 255, doi. 10.3390/math12020255
- By:
- Publication type:
- Article
A Novel Truncated Normal Tensor Completion Method for Multi-Source Fusion Data.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 2, p. 223, doi. 10.3390/math12020223
- By:
- Publication type:
- Article
Sequence Prediction and Classification of Echo State Networks.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 22, p. 4640, doi. 10.3390/math11224640
- By:
- Publication type:
- Article
An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 21, p. 4501, doi. 10.3390/math11214501
- By:
- Publication type:
- Article
A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 19, p. 4078, doi. 10.3390/math11194078
- By:
- Publication type:
- Article
Malicious Traffic Classification via Edge Intelligence in IIoT.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3951, doi. 10.3390/math11183951
- By:
- Publication type:
- Article
Intelligent Algorithms for Event Processing and Decision Making on Information Protection Strategies against Cyberattacks.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3939, doi. 10.3390/math11183939
- By:
- Publication type:
- Article
Using Traffic Sensors in Smart Cities to Enhance a Spatio-Temporal Deep Learning Model for COVID-19 Forecasting.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3904, doi. 10.3390/math11183904
- By:
- Publication type:
- Article
A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3894, doi. 10.3390/math11183894
- By:
- Publication type:
- Article
KI am und im Werk: Datenbasierte Optimierung für smarte Produktionsprozesse.
- Published in:
- IM + io, 2023, n. 4, p. 60
- By:
- Publication type:
- Article