N Rust-Nguyen, S Sharma, M Stamp - Computers & Security, 2023 - Elsevier
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has employed machine learning and deep learning techniques to automate the …
Deep machine learning techniques have shown promising results in network traffic classification, however, the robustness of these techniques under adversarial threats is still …
N Rust-Nguyen, M Stamp - arXiv preprint arXiv:2206.06371, 2022 - arxiv.org
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has employed machine learning and deep learning techniques to automate the …
J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and defensing cyber crimes. Although notable research efforts have been dedicated to …
In recent years, with the rapid development of Internet services in all walks of life, a large number of malicious acts such as network attacks, data leakage, and information theft have …
A Almomani - Information Systems and e-Business Management, 2023 - Springer
Darknet, a source of cyber intelligence, refers to the internet's unused address space, which people do not expect to interact with their computers. The establishment of security requires …
A Jenefa, V Edward Naveen - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
The Darknet is a section of the internet that is encrypted and untraceable, making it a popular location for illicit and illegal activities. However, the anonymity and encryption …
The Darknet is a set of networks and technologies, having as fundamental principles anonymity and security. In many cases, they are associated with illicit activities, opening …
R Ning, C Xin, H Wu - IEEE INFOCOM 2022-IEEE Conference …, 2022 - ieeexplore.ieee.org
While deep learning (DL)-based network traffic classification has demonstrated its success in a range of practical applications, such as network management and security control to just …