H Lin, Z Yan, Y Chen, L Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network …
S Greene, H Thapliyal… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
The rise of internet connected devices has enabledthe home with a vast amount of enhancements to make lifemore convenient. These internet connected devices can be used …
The Internet has opened new avenues for information accessing and sharing in a variety of media formats. Such popularity has resulted in an increase of the amount of resources …
J Renita, NE Elizabeth - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Network Monitoring is a procedure used to monitor a computer network system and notify the network administrator in case of any outages. It is necessary to diagnose and report the …
Q Liu, Y Liu, Q Meng, T Yu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
The Software-Defined Internet of Things (SD-IoT) utilizes the centralized control and programmability of Software-Defined Networking (SDN) to enhance network performance …
W Zhu, P Li, B Luo, H Xu… - 2018 9th international …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet and the continuous rise of network users, the network traffic in various regions is increasing rapidly. In the face of a large number of high speed …
A Papadogiannakis, M Polychronakis… - Proceedings of the 2013 …, 2013 - dl.acm.org
Many network monitoring applications must analyze traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP …
A Papadogiannakis, M Polychronakis… - IEEE Journal on …, 2014 - ieeexplore.ieee.org
Intrusion detection, traffic classification, and other network monitoring applications need to analyze the captured traffic beyond the network layer to allow for connection-oriented …