UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 1,974
1.
  • A survey of deep learning-b... A survey of deep learning-based network anomaly detection
    Kwon, Donghwoon; Kim, Hyunjoo; Kim, Jinoh ... Cluster computing, 01/2019, Volume: 22, Issue: Suppl 1
    Journal Article
    Peer reviewed

    A great deal of attention has been given to deep learning over the past several years, and new deep learning techniques are emerging with improved functionality. Many computer and network ...
Full text
2.
Full text

PDF
3.
  • Machine Learning-Powered En... Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey
    Shen, Meng; Ye, Ke; Liu, Xingtong ... IEEE Communications surveys and tutorials, 2023-Firstquarter, 2023-00-00, 20230101, Volume: 25, Issue: 1
    Journal Article
    Peer reviewed

    Traffic analysis is the process of monitoring network activities, discovering specific patterns, and gleaning valuable information from network traffic. It can be applied in various fields such as ...
Full text
4.
  • A survey of advances in vis... A survey of advances in vision-based vehicle re-identification
    Khan, Sultan Daud; Ullah, Habib Computer vision and image understanding, 20/May , Volume: 182
    Journal Article
    Peer reviewed
    Open access

    Vehicle re-identification (V-reID) has become significantly popular in the community due to its applications and research significance. In particular, the V-reID is an important problem that still ...
Full text

PDF
5.
  • Toward Generating a New Clo... Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization
    Shafi, MohammadMoein; Lashkari, Arash Habibi; Rodriguez, Vicente ... Information (Basel), 04/2024, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating ...
Full text
6.
  • Anomaly Detection in Road T... Anomaly Detection in Road Traffic Using Visual Surveillance
    Santhosh, K. K.; Dogra, D. P.; Roy, P. P. ACM computing surveys, 11/2021, Volume: 53, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Computer vision has evolved in the last decade as a key technology for numerous applications replacing human supervision. Timely detection of traffic violations and abnormal behavior of pedestrians ...
Full text

PDF
7.
  • Android malware detection u... Android malware detection using network traffic based on sequential deep learning models
    Fallah, Somayyeh; Bidgoly, Amir Jalaly Software, practice & experience, September 2022, 2022-09-00, 20220901, Volume: 52, Issue: 9
    Journal Article
    Peer reviewed

    The increasing trend of smartphone capabilities has caught the attention of many users. This has led to the emergence of malware that threatening the users' privacy and security. Many malware ...
Full text
8.
  • The rise of traffic classif... The rise of traffic classification in IoT networks: A survey
    Tahaei, Hamid; Afifi, Firdaus; Asemi, Adeleh ... Journal of network and computer applications, 03/2020, Volume: 154
    Journal Article
    Peer reviewed

    With the proliferation of the Internet of Things (IoT), the integration and communication of various objects have become a prevalent practice. The huge growth of IoT devices and different ...
Full text
9.
  • Encrypted malicious traffic... Encrypted malicious traffic detection based on natural language processing and deep learning
    Zang, Xiaodong; Wang, Tongliang; Zhang, Xinchang ... Computer networks (Amsterdam, Netherlands : 1999), August 2024, 2024-08-00, Volume: 250
    Journal Article
    Peer reviewed

    The focus on privacy protection has brought much-encrypted network traffic. However, attackers always abuse traffic encryption to conceal malicious behaviors. Although researchers have proposed ...
Full text
10.
Full text

PDF
1 2 3 4 5
hits: 1,974

Load filters