[HTML][HTML] Deep learning for network traffic monitoring and analysis (NTMA): A survey

M Abbasi, A Shahraki, A Taherkordi - Computer Communications, 2021 - Elsevier
Modern communication systems and networks, eg, Internet of Things (IoT) and cellular
networks, generate a massive and heterogeneous amount of traffic data. In such networks …

Intrusion detection system based on fast hierarchical deep convolutional neural network

RV Mendonça, AAM Teodoro, RL Rosa, M Saadi… - IEEE …, 2021 - ieeexplore.ieee.org
Currently, with the increasing number of devices connected to the Internet, search for
network vulnerabilities to attackers has increased, and protection systems have become …

Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

无线通信网络中流量分析技术综述.

程定国, 曾浩洋 - Telecommunication Engineering, 2023 - search.ebscohost.com
对无线网络流量的分析和准确预测是无线网络管理与安全领域的重要研究内容之一,
在网络规划, 网络监控, 流量趋势分析, 网络优化以及入侵检测和异常检测等方面发挥着重要作用 …

Proposal and validation of a standard protection profile for homologation of commercial videoconferencing equipment

ACB Florentino, SCM Barbalho, RCS Machado - IEEE Access, 2021 - ieeexplore.ieee.org
In the present work, we propose and validate a Common Criteria Standard Protection Profile
(sPP) for videoconferencing equipment. The research presents the definition and analysis of …

Best Classifier Analysis for Classification-Machine Learning Algorithms

R Sasirekha, U Harshavardhini… - … Conference on Data …, 2023 - ieeexplore.ieee.org
Machine Learning extends everywhere in the world. Prediction based on the classification of
data, misprediction may lead the model to failure. Hence, it is necessary to learn the …

A review on attack in wireless and computer networking

T Mehrotra - Asian Journal of Multidimensional Research, 2021 - indianjournals.com
The Man-In-The-Middle attack is one of the most widely discussed assaults in computer
security, and it is a significant worry for many security experts. The attackers are after the …