Results 21 to 30 of about 27,602 (172)
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider +3 more
core +2 more sources
Study on SSL/TLS Encrypted Malicious Traffic Detection Algorithm Based on Graph Neural Networks [PDF]
In order to achieve precise detection of SSL/TLS encrypted malicious traffic,a graph neural network-based model for malicious encrypted traffic detection is proposed,to address the issue of excessive reliance on expert experience in traditional machine ...
TANG Ying, WANG Baohui
doaj +1 more source
User Behavior Detection Using Multi-Modal Signatures of Encrypted Network Traffic
With the development of the network environment and the emergence of new applications, network traffic has become increasingly complex. This paper focuses on user behavior detection based on encrypted traffic analysis.
Jee-Tae Park +3 more
doaj +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi +7 more
wiley +1 more source
Distributed wireless network resource optimisation method based on mobile edge computing
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang +4 more
wiley +1 more source
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley +1 more source
Transport Layer Security-Encrypted Abnormal Traffic Detection Based on Supervised Autoencoder [PDF]
As user awareness of privacy protection increases, an increasing number of websites and services are employing the Transport Layer Security (TLS) protocol to safeguard user data.
YANG Mingfen, GAN Yun, ZHANG Xingpeng
doaj +1 more source
Privacy-Friendly Mobility Analytics using Aggregate Location Data [PDF]
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can ...
De Cristofaro, Emiliano +2 more
core +2 more sources
Moving in next door: Network flooding as a side channel in cloud environments [PDF]
The final publication is available at http://link.springer.com/chapter/10.1007/978-3-319-48965-0_56Co-locating multiple tenants' virtual machines (VMs) on the same host underpins public clouds' affordability, but sharing physical hardware also exposes ...
Agarwal, Yatharth +4 more
core +2 more sources

