Results 141 to 150 of about 4,251 (194)

A dataset collected in real-world industrial control systems for network attack detection. [PDF]

open access: yesSci Data
Zhou X   +9 more
europepmc   +1 more source

LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]

open access: yesDiscov Comput
Kumar S   +5 more
europepmc   +1 more source

Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks. [PDF]

open access: yesSci Rep
Abdulganiyu OH   +6 more
europepmc   +1 more source

Malicious traffic detection in encrypted network (本文)

open access: yesMalicious traffic detection in encrypted network (本文)
openaire  

Malicious traffic detection in encrypted network (要旨)

open access: yesMalicious traffic detection in encrypted network (要旨)
openaire  

A Survey of Encrypted Malicious Traffic Detection

2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 2021
With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without decryption has become a research hotspot. Combined with deep learning, an important branch of machine learning, encrypted malicious traffic detection has achieved good ...
Yanmiao Li   +5 more
openaire   +1 more source

Balancing the Detection of Malicious Traffic in SDN Context

2021 Twelfth International Conference on Ubiquitous and Future Networks (ICUFN), 2021
Huge efforts and resources are spent every year on prevention and recovery of cyberattacks targeting users, services and network infrastructures. Software-Defined Networking (SDN) is a technology providing advances to the field of security with the ability of programming the network, promoting highperformance solutions and efficient resource ...
Machado, Bruno Salgado   +3 more
openaire   +2 more sources

DNS traffic analysis for malicious domains detection

2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015
The web has become the medium of choice for people to search for information, conduct business, and enjoy entertainment. At the same time, the web has also become the primary platform used by miscreants to attack users. For example, drive-by-download attacks, which could be through malicious domains, are a popular choice among bot herders to grow their
Ibrahim Ghafir, Vaclav Prenosil
openaire   +1 more source

Home - About - Disclaimer - Privacy