Traffic classification acquired the interest of the Internet community early on. Different approaches have been proposed to classify Internet traffic to manage both security and …
As the size and source of network traffic increase, so does the challenge of monitoring and analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the …
Reliable identification of encrypted file fragments is a requirement for several security applications, including ransomware detection, digital forensics, and traffic analysis. A …
Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted data fragments. Typically, current approaches …
P Choudhury, KRP Kumar, S Nandi… - Multimedia Tools and …, 2020 - Springer
VoIP traffic classification plays a major role towards network policy enforcements. Characterization of VoIP media traffic is based on codec behaviour. With the introduction of …
MM Saleh, M AlSlaiman, MI Salman, B Wang - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. The increased reliance on IoT raised serious information …
Ransomware attacks continue to grow in both severity and prevalence as attackers target public infrastructure, governments, and companies. This problem has spawned a wide …
O Kayode, AS Tosun - ICC 2019-2019 IEEE International …, 2019 - ieeexplore.ieee.org
In this current era of Internet of Things, data privacy and security of internet enabled devices has become a major concern of many users and manufacturers. Massive amount of data is …