Results 161 to 170 of about 36,419 (228)
Some of the next articles are maybe not open access.
International Conference on Computing and Artificial Intelligence, 2020
Malicious encrypted traffic poses great threat to cyber security owing to encryption and the ability to bypass traditional traffic detection schemes.
Daichong Chao
semanticscholar +1 more source
Malicious encrypted traffic poses great threat to cyber security owing to encryption and the ability to bypass traditional traffic detection schemes.
Daichong Chao
semanticscholar +1 more source
Application identification from encrypted traffic based on characteristic changes by encryption
2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), 2011Application identification is paid much attention by network operators to manage application based traffic control in the Internet. However, encryption is one of the factors to make application identification difficult, because it is so hard to infer the original (unencrypted) packets from encrypted packets.
Yohei Okada +4 more
openaire +1 more source
Packet Bytes-Based Abnormal Encrypted Proxy Traffic Identification
2024 IEEE 30th International Conference on Telecommunications (ICT)With the increasing concern about the leakage of user privacy, encryption proxies have been widely used by Internet service providers as a means to protect users' privacy.
Shunliang Zhang, Hongce Zhao, Zuwei Fan
openaire +2 more sources
A Classification and Identification Technology of TLS Encrypted Traffic Applications
2021 IEEE 4th International Conference on Big Data and Artificial Intelligence (BDAI), 2021In the paper, regarding the transport layer security encrypted traffic of the Internet, the application program identification and application protocol classification technology of encrypted traffic based on hidden Markov model and long short-term memory networks are studied, and the encrypted traffic detection prototype is constructed.
Yue Zhao +6 more
openaire +1 more source
2025 IEEE 6th International Conference on Computer, Big Data, Artificial Intelligence (ICCBD+AI)
The rapid evolution of network applications necessitates that models for identifying encrypted traffic continuously adapt to new categories with limited labeled samples while mitigating the risk of catastrophic forgetting. To address this challenge, this
Yao Liu +5 more
semanticscholar +1 more source
The rapid evolution of network applications necessitates that models for identifying encrypted traffic continuously adapt to new categories with limited labeled samples while mitigating the risk of catastrophic forgetting. To address this challenge, this
Yao Liu +5 more
semanticscholar +1 more source
Electronics
Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc.
Shihe Zhang +6 more
semanticscholar +1 more source
Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc.
Shihe Zhang +6 more
semanticscholar +1 more source
Identification of Smartphone Applications by Encrypted Traffic Analysis
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the ...
Anan Sawabe, Takanori Iwai, Kozo Satoda
openaire +1 more source
IEEE Transactions on Cognitive Communications and Networking
Identifying encrypted traffic is essential for network management, but it becomes increasingly challenging as more and more users adopt encryption protocols and traffic defense mechanisms for data privacy.
Xiaojuan Wang +4 more
semanticscholar +1 more source
Identifying encrypted traffic is essential for network management, but it becomes increasingly challenging as more and more users adopt encryption protocols and traffic defense mechanisms for data privacy.
Xiaojuan Wang +4 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2021
Decentralized Applications (DApps) are increasingly developed and deployed on blockchain platforms such as Ethereum. DApp fingerprinting can identify users’ visits to specific DApps by analyzing the resulting network traffic, revealing much sensitive ...
Meng Shen +4 more
semanticscholar +1 more source
Decentralized Applications (DApps) are increasingly developed and deployed on blockchain platforms such as Ethereum. DApp fingerprinting can identify users’ visits to specific DApps by analyzing the resulting network traffic, revealing much sensitive ...
Meng Shen +4 more
semanticscholar +1 more source
Encrypted Traffic Identification in Power IoT based on CNN with Batch Normalization
2024 6th International Conference on Electrical Engineering and Control Technologies (CEECT)With the rapid development of new power system, encrypted traffic in power IoT has surged. How to effectively identify encrypted traffic has become a new challenge for industrial control security detection.
Menglin Li +5 more
semanticscholar +1 more source

