6G -enabled qubit-based concealed communication with AI-driven breach detection in autonomous fleets. [PDF]
T V +3 more
europepmc +1 more source
Semi-Supervised Encrypted Malicious Traffic Detection Based on Multimodal Traffic Characteristics. [PDF]
Liu M, Yang Q, Wang W, Liu S.
europepmc +1 more source
A secure and efficient deep learning-based intrusion detection framework for the internet of vehicles. [PDF]
Khan H +5 more
europepmc +1 more source
Few-shot traffic classification based on autoencoder and deep graph convolutional networks. [PDF]
Xu S, Han J, Liu Y, Liu H, Bai Y.
europepmc +1 more source
Security of ADS-B and Remote ID Systems: Cyberattacks, Detection Techniques, and Countermeasures. [PDF]
Shi Q, Caleb TD, Shao S, Kaabouch N.
europepmc +1 more source
Cloud edge enabled stacked ensemble learning framework with meta model for situation aware maritime traffic monitoring and control systems. [PDF]
Ahmad Z, Seo JT, Jeon S.
europepmc +1 more source
Related searches:
A Survey on Encrypted Traffic Identification
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, 2020In recent years, due to the need of privacy protection, the proportion of encrypted traffic in the network continues to growth. Traditional network traffic identification methods for non-encrypted traffic are difficult to use to encrypted traffic, therefore, analysis methods suitable for encrypted traffic have become a new research hotspot in network ...
Rui Liu, Xiangzhan Yu
openaire +2 more sources
Deep learning-based real-time VPN encrypted traffic identification methods
Journal of Real-Time Image Processing, 2019With the widespread application of virtual private network (VPN) technology, real-time VPN traffic identification has become an increasingly important task in network management and security maintenance. Since traditional encrypted traffic identification technology is not effective in feature extraction and selection, this paper proposes two deep ...
Lulu Guo +5 more
openaire +2 more sources
FLOWGAN:Unbalanced Network Encrypted Traffic Identification Method Based on GAN
2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2019It is crucial to accurately identify the type of traffic and application so that it can enable various policy-driven network management and security monitoring. However, with the increasing adoption of Internet applications use encryption protocols to transmit data, traffic classification is becoming more difficult.
ZiXuan Wang +4 more
openaire +2 more sources
Learning from imbalanced data for encrypted traffic identification problem
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016Identifying encrypted application traffic is an important issue for many network tasks including quality of service, firewall enforcement and security. One of the challenging problems of classifying encrypted application traffic is the imbalanced property of network data.
Ly Vu, Dong Van Tra, Quang Uy Nguyen
openaire +2 more sources

