Results 11 to 20 of about 3,240 (155)

Network traffic classification model based on attention mechanism and spatiotemporal features

open access: yesEURASIP Journal on Information Security, 2023
Traffic classification is widely used in network security and network management. Early studies have mainly focused on mapping network traffic to different unencrypted applications, but little research has been done on network traffic classification of ...
Feifei Hu   +5 more
doaj   +1 more source

Robot Communication: Network Traffic Classification Based on Deep Neural Network

open access: yesFrontiers in Neurorobotics, 2021
With the rapid popularization of robots, the risks brought by robot communication have also attracted the attention of researchers. Because current traffic classification methods based on plaintext cannot classify encrypted traffic, other methods based ...
Mengmeng Ge, Xiangzhan Yu, Likun Liu
doaj   +1 more source

Research on Malicious Encrypted Traffic Annotation Method for Android Mobile Application [PDF]

open access: yesJisuanji gongcheng, 2020
In order to distinguish malicious traffic generated by running malicious Android applications from normal traffic,this paper proposes a method for annotating malicious traffic of mobile Android applications.For encrypted network traffic,encryption ...
HE Gaofeng, SI Yongrui, XU Bingfeng
doaj   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

CBS: A Deep Learning Approach for Encrypted Traffic Classification With Mixed Spatio-Temporal and Statistical Features

open access: yesIEEE Access, 2023
With the rapid advancement of the internet and online applications, traffic classification has become an increasingly significant topic in computer networks. Managing network resources, improving service quality, and enhancing cybersecurity are critical.
Mehdi Seydali   +3 more
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Encrypted traffic identification method based on deep residual capsule network with attention mechanism

open access: yes网络与信息安全学报, 2023
With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic ...
Guozhen SHI   +3 more
doaj   +3 more sources

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Identification of Malicious Encrypted Traffic Through Feature Fusion

open access: yesIEEE Access, 2023
The popularity of encrypted communication has grown due to increased security awareness and rapid internet development. End-to-end encryption can prevent data attacks but also poses new cybersecurity threats. Thus, identifying malicious encrypted traffic
Xianchun Zheng, Hui Li
doaj   +1 more source

Home - About - Disclaimer - Privacy