Results 111 to 120 of about 4,077 (204)

Analytics over Encrypted Traffic and Defenses

open access: yes, 2023
Encrypted traffic flows have been known to leak information about their underlying content through statistical properties such as packet lengths and timing. While traffic fingerprinting attacks exploit such information leaks and threaten user privacy by disclosing website visits, videos streamed, and user activity on messaging platforms, they can also ...
openaire   +1 more source

Encrypted traffic classification method based on parallel traffic graph and graph neural network

open access: yesTongxin xuebao
Aiming at the problems of traditional encrypted traffic classification methods limited by the imbalance of dataset classes and the unreliability of the features used in complex network environments, an encrypted traffic classification method based on ...
LIU Taotao, FU Yu, YU Yihan, AN Yishuai
doaj  

LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]

open access: yesDiscov Comput
Kumar S   +5 more
europepmc   +1 more source

CLASSIFICATION FEATURES OF ENCRYPTED NETWORK TRAFFIC

open access: yesIZVESTIYA SFedU. ENGINEERING SCIENCES, 2020
N. V. Boldyrikhin   +2 more
openaire   +2 more sources

Network intrusion detection in encrypted traffic

open access: yes
Παρουσιάστηκε στο: 2022 IEEE Conference on Dependable and Secure ...
Papadogiannaki Eva()   +3 more
openaire   +1 more source

Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic

open access: yesTongxin xuebao
To trace the misuse of university library electronic resources, such as excessive downloading and frequent access, the Sun Yat-sen University traffic big data analysis platform was leveraged to analyze abnormal access behaviors from the perspective of ...
WEI Yujun   +4 more
doaj  

Encrypted Traffic Classification in Anonymity Networks

open access: yes
Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network and provides anonymity to users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways.
openaire   +2 more sources

Home - About - Disclaimer - Privacy