Results 111 to 120 of about 4,077 (204)
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review. [PDF]
Ji IH +5 more
europepmc +1 more source
Analytics over Encrypted Traffic and Defenses
Encrypted traffic flows have been known to leak information about their underlying content through statistical properties such as packet lengths and timing. While traffic fingerprinting attacks exploit such information leaks and threaten user privacy by disclosing website visits, videos streamed, and user activity on messaging platforms, they can also ...
openaire +1 more source
Encrypted traffic classification method based on parallel traffic graph and graph neural network
Aiming at the problems of traditional encrypted traffic classification methods limited by the imbalance of dataset classes and the unreliability of the features used in complex network environments, an encrypted traffic classification method based on ...
LIU Taotao, FU Yu, YU Yihan, AN Yishuai
doaj
LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]
Kumar S +5 more
europepmc +1 more source
CLASSIFICATION FEATURES OF ENCRYPTED NETWORK TRAFFIC
N. V. Boldyrikhin +2 more
openaire +2 more sources
Network intrusion detection in encrypted traffic
Παρουσιάστηκε στο: 2022 IEEE Conference on Dependable and Secure ...
Papadogiannaki Eva() +3 more
openaire +1 more source
Enhancing encrypted HTTPS traffic classification based on stacked deep ensembles models. [PDF]
Elshewey AM, Osman AM.
europepmc +1 more source
To trace the misuse of university library electronic resources, such as excessive downloading and frequent access, the Sun Yat-sen University traffic big data analysis platform was leveraged to analyze abnormal access behaviors from the perspective of ...
WEI Yujun +4 more
doaj
Contextual classification of network traffic through rough set theory and convolutional neural networks. [PDF]
Priyanka D, Sundara Krishna YK.
europepmc +1 more source
Encrypted Traffic Classification in Anonymity Networks
Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network and provides anonymity to users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways.
openaire +2 more sources

