Results 21 to 30 of about 28,593 (259)
TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM
Traffic classification is the first step in network anomaly detection and is essential to network security. However, existing malicious traffic classification methods have several limitations; for example, statistical-based methods are vulnerable to hand-
Zhaolei Shi +3 more
doaj +1 more source
A Survey of Network Traffic Classification
This survey is dedicated to the task of network traffic classification, particularly to the use of machine learning algorithms in this task. The survey begins with the description of the task, its variations and possible uses in real-world problems.
Aleksandr Igorevich Getman +1 more
openaire +2 more sources
In computer networks, diverse applications generate network traffic with different characteristics. Network traffic classification is significant to manage networks better, improve service quality and ensure security.
Özgür TONKAL, Hüseyin POLAT
doaj +1 more source
Application and Research of Markov Model in Network Traffic Classification [PDF]
With the development of information science and technology,the traditional port number and depth packet detection classification technology can not meet the classification requirements of various applications in the network,and can not be classified ...
ZHAO Ying,HAN Chunhao
doaj +1 more source
With the proliferation of network systems, the boundaries between cyber and physical environments are blurring, leading to an increased risk of sophisticated cyber-attacks equipped with advanced technologies.
Younghoan Jang +6 more
doaj +1 more source
Semi-2DCAE: a semi-supervision 2D-CNN AutoEncoder model for feature representation and classification of encrypted traffic [PDF]
Traffic classification is essential in network-related areas such as network management, monitoring, and security. As the proportion of encrypted internet traffic rises, the accuracy of port-based and DPI-based traffic classification methods has declined.
Jun Cui +4 more
doaj +2 more sources
Network traffic classification techniques and challenges [PDF]
The number of alleged crimes in computer networks had not increased until a few years ago. Real-time analysis has become essential to detect any suspicious activities. Network classification is the first step of network traffic analysis, and it is the core element of network intrusion detection systems (IDS).
Al Khater, Noora, Overill, Richard E.
openaire +2 more sources
Network Flow Classification Methodrule-Based
In this paper,repeated incremental pruning to produce error reduction which is a rule learning ethod is used to solve network traffic classification. The method can be used to dig out the correlations between ttributes and classes,which are utilized to ...
CAO Yan-zhen +3 more
doaj +1 more source
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source

