Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Network traffic detection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Network traffic detection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Network traffic detection"
Chadrack, Irabaruta, and Dr Nyesheja Muhire Enan. "AI Powered Network Traffic Detection." Journal of Information and Technology 5, no. 2 (2025): 53–65. https://doi.org/10.70619/vol5iss2pp53-65.
Der volle Inhalt der QuelleKatuk, Norliza, Mohamad Sabri Sinal, Mohammed Gamal Ahmed Al-Samman, and Ijaz Ahmad. "An observational mechanism for detection of distributed denial-of-service attacks." International Journal of Advances in Applied Sciences 12, no. 2 (2023): 121. http://dx.doi.org/10.11591/ijaas.v12.i2.pp121-132.
Der volle Inhalt der QuelleNorliza, Katuk, Gamal Ahmed Al-Samman Mohammed, and Ahmad Ijaz. "An observational mechanism for detection of distributed denial-of-service attacks." International Journal of Advances in Applied Sciences (IJAAS) 12, no. 2 (2023): 132. https://doi.org/10.11591/ijaas.v12.i2.pp121-132.
Der volle Inhalt der QuelleJiang, Ding De, Cheng Yao, Zheng Zheng Xu, Peng Zhang, Zhen Yuan, and Wen Da Qin. "An Continuous Wavelet Transform-Based Detection Approach to Traffic Anomalies." Applied Mechanics and Materials 130-134 (October 2011): 2098–102. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2098.
Der volle Inhalt der QuellePraveena, Nutakki, Dr Ujwal A. Lanjewar, and Chilakalapudi Meher Babu. "VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 1 (2013): 29–34. http://dx.doi.org/10.24297/ijct.v5i1.4383.
Der volle Inhalt der QuelleFu, Xingbing, Xuewen Zhang, Jianfeng Fu, Bingjin Wu, and Jianwu Zhang. "Deep metric learning based approach for network intrusion detection." Journal of Physics: Conference Series 2504, no. 1 (2023): 012037. http://dx.doi.org/10.1088/1742-6596/2504/1/012037.
Der volle Inhalt der QuelleSon, Vu Ngoc. "Optimizing Network Anomaly Detection Based on Network Traffic." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 53–60. http://dx.doi.org/10.46338/ijetae1121_07.
Der volle Inhalt der QuellePratomo, Baskoro A., Pete Burnap, and George Theodorakopoulos. "BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks." Security and Communication Networks 2020 (August 4, 2020): 1–15. http://dx.doi.org/10.1155/2020/8826038.
Der volle Inhalt der QuelleOh, Changhyeon, and Yuseok Ban. "Cross-Modality Interaction-Based Traffic Accident Classification." Applied Sciences 14, no. 5 (2024): 1958. http://dx.doi.org/10.3390/app14051958.
Der volle Inhalt der QuelleZhiwei Zhang, Zhiwei Zhang, Guiyuan Tang Zhiwei Zhang, Baoquan Ren Guiyuan Tang, Baoquan Ren Baoquan Ren, and Yulong Shen Baoquan Ren. "TV-ADS: A Smarter Attack Detection Scheme Based on Traffic Visualization of Wireless Network Event Cell." 網際網路技術學刊 25, no. 2 (2024): 301–11. http://dx.doi.org/10.53106/160792642024032502012.
Der volle Inhalt der QuelleDissertationen zum Thema "Network traffic detection"
Brauckhoff, Daniela. "Network traffic anomaly detection and evaluation." Aachen Shaker, 2010. http://d-nb.info/1001177746/04.
Der volle Inhalt der QuelleUdd, Robert. "Anomaly Detection in SCADA Network Traffic." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122680.
Der volle Inhalt der QuelleYellapragada, Ramani. "Probabilistic Model for Detecting Network Traffic Anomalies." Ohio University / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1088538020.
Der volle Inhalt der QuelleZhang, Junjie. "Effective and scalable botnet detection in network traffic." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.
Der volle Inhalt der QuelleBabaie, Tahereh Tara. "New Methods for Network Traffic Anomaly Detection." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/12032.
Der volle Inhalt der QuelleVu, Hong Linh. "DNS Traffic Analysis for Network-based Malware Detection." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93842.
Der volle Inhalt der QuelleDandurand, Luc. "Detection of network infrastructure attacks using artificial traffic." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq44906.pdf.
Der volle Inhalt der QuelleGupta, Vikas. "File Detection in Network Traffic Using Approximate Matching." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22696.
Der volle Inhalt der QuelleBrauckhoff, Daniela [Verfasser]. "Network Traffic Anomaly Detection and Evaluation / Daniela Brauckhoff." Aachen : Shaker, 2010. http://d-nb.info/1122546610/34.
Der volle Inhalt der QuelleTaggart, Benjamin T. "Incorporating neural network traffic prediction into freeway incident detection." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=723.
Der volle Inhalt der QuelleBücher zum Thema "Network traffic detection"
Bhuyan, Monowar H., Dhruba K. Bhattacharyya, and Jugal K. Kalita. Network Traffic Anomaly Detection and Prevention. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65188-0.
Der volle Inhalt der QuelleThancanamootoo, S. Automatic detection of traffic incidents on a signal-controlled road network. University of Newcastle upon Tyne, Transport Operations Research Group, 1988.
Den vollen Inhalt der Quelle findenBiersack, Ernst. Data Traffic Monitoring and Analysis: From Measurement, Classification, and Anomaly Detection to Quality of Experience. Springer Berlin Heidelberg, 2013.
Den vollen Inhalt der Quelle findenRajchel, Brett. Unsupervised Learning of Network Traffic Behaviors for Insider Threat Detection. Independently Published, 2021.
Den vollen Inhalt der Quelle findenKalita, Jugal K., Monowar H. Bhuyan, and Dhruba K. Bhattacharyya. Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools. Springer, 2018.
Den vollen Inhalt der Quelle findenKalita, Jugal K., Monowar H. Bhuyan, and Dhruba K. Bhattacharyya. Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools. Springer, 2017.
Den vollen Inhalt der Quelle findenTari, Zahir, Adil Fahad, Abdulmohsen Almalawi, and Xun Yi. Network Classification for Traffic Management: Anomaly detection, feature selection, clustering and classification. Institution of Engineering and Technology, 2020. http://dx.doi.org/10.1049/pbpc032e.
Der volle Inhalt der QuelleTari, Zahir, Adil Fahad, Abdulmohsen Almalawi, and Xun Yi. Network Classification for Traffic Management: Anomaly Detection, Feature Selection, Clustering and Classification. Institution of Engineering & Technology, 2020.
Den vollen Inhalt der Quelle findenEngland, Highways. Design Manual for Roads and Bridges : Vol. 9 : Network - Traffic Control and Communications, Section 1 : Detection Technology, Part 2: Detection on the Motorway and Trunk Road Network. Stationery Office, The, 2017.
Den vollen Inhalt der Quelle findenEngland, Highways. Design Manual for Roads and Bridges : Vol. 9 : Network - Traffic Control and Communications, Section 1 : Detection Technology, Part 2: Detection on the Motorway and Trunk Road Network Annex F. Stationery Office, The, 2018.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Network traffic detection"
Yao, Danfeng Daphne, Xiaokui Shu, Long Cheng, and Salvatore J. Stolfo. "Anomaly Detection on Network Traffic." In Anomaly Detection as a Service. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-031-02354-5_6.
Der volle Inhalt der QuelleCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Detection of Anomalous Encrypted Traffic." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_4.
Der volle Inhalt der QuelleCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Artificial Intelligence-Based Approaches for Anomaly Detection." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_5.
Der volle Inhalt der QuelleLiu, ChenHuan, QianKun Liu, ShanShan Hao, CongXiao Bao, and Xing Li. "IPv6-Darknet Network Traffic Detection." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78612-0_19.
Der volle Inhalt der QuelleKrzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Der volle Inhalt der QuelleCui, Qian, Guy-Vincent Jourdan, Gregor V. Bochmann, and Iosif-Viorel Onut. "Proactive Detection of Phishing Kit Traffic." In Applied Cryptography and Network Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78375-4_11.
Der volle Inhalt der QuelleColuccia, Angelo, Alessandro D’Alconzo, and Fabio Ricciato. "Distribution-Based Anomaly Detection in Network Traffic." In Data Traffic Monitoring and Analysis. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36784-7_9.
Der volle Inhalt der QuelleWang, Hanyang, Sirui Zhou, Honglei Li, et al. "Deep Learning Network Intrusion Detection Based on Network Traffic." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06791-4_16.
Der volle Inhalt der QuelleBialas, Andrzej, Marcin Michalak, and Barbara Flisiuk. "Anomaly Detection in Network Traffic Security Assurance." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19501-4_5.
Der volle Inhalt der Quellede la Puerta, José Gaviria, Iker Pastor-López, Borja Sanz, and Pablo G. Bringas. "Network Traffic Analysis for Android Malware Detection." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29859-3_40.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Network traffic detection"
Žada, Frane, and Martina Antonić. "Network Traffic Intrusion Detection." In 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2024. http://dx.doi.org/10.23919/softcom62040.2024.10721884.
Der volle Inhalt der QuelleDeepika, D., Deepika Pogiri, Lokesh Raj Pandravisham, Yashwanth Kumar Prudvi, and Sathvik Reddy Ramannagari. "Anomaly Network Traffic Detection of Wireless Network System." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10689805.
Der volle Inhalt der QuelleKorniszuk, Krzysztof, and Bartosz Sawicki. "Autoencoder-Based Anomaly Detection in Network Traffic." In 2024 25th International Conference on Computational Problems of Electrical Engineering (CPEE). IEEE, 2024. http://dx.doi.org/10.1109/cpee64152.2024.10720411.
Der volle Inhalt der QuelleSharma, Jatin, Kanwarpartap Singh Gill, Deepak Upadhyay, and Swati Devliyal. "Revolutionizing Network Safety: Convolutional Neural Networks for Traffic Anomaly Detection." In 2024 Asian Conference on Intelligent Technologies (ACOIT). IEEE, 2024. https://doi.org/10.1109/acoit62457.2024.10939940.
Der volle Inhalt der QuelleGu, Yonghao, Xiaoqing Zhang, Hao Xu, and Tiejun Wu. "DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00253.
Der volle Inhalt der QuelleKoumar, Josef, Jaroslav Pesek, Kamil Jerabek, and Tomáš Čejka. "Towards Building Network Outlier Detection System for Network Traffic Monitoring." In NOMS 2025-2025 IEEE Network Operations and Management Symposium. IEEE, 2025. https://doi.org/10.1109/noms57970.2025.11073727.
Der volle Inhalt der QuelleJerabek, Kamil, Josef Koumar, Jiří Setinský, and Jaroslav Pesek. "Explainable Anomaly Detection in Network Traffic Using LLM." In NOMS 2025-2025 IEEE Network Operations and Management Symposium. IEEE, 2025. https://doi.org/10.1109/noms57970.2025.11073574.
Der volle Inhalt der QuelleLuo, Yongsheng. "Using Graph Neural Networks to Improve Network Traffic Anomaly Detection Performance." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2025. https://doi.org/10.1109/icdcece65353.2025.11035232.
Der volle Inhalt der QuelleMiani, Rodrigo Sanches, Regina Melo Silveira, Rafael Pasquini, Luciana Arantes, and Pierre Sens. "Network Slice Monitoring System For Disaster Detection." In Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbrc.2025.6415.
Der volle Inhalt der QuelleGoel, Avnish, Apoorv Kashyap, B. Devesha Reddy, Rochak Kaushik, S. Nagasundari, and Prasad B. Honnavali. "Detection of VPN Network Traffic." In 2022 IEEE Delhi Section Conference (DELCON). IEEE, 2022. http://dx.doi.org/10.1109/delcon54057.2022.9753621.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Network traffic detection"
De Lucia, Michael, Daniel Krych, Stephen Raio, and Jason Ellis. An Empirical Investigation of Packet Header-Only Network Traffic Anomaly Detection and Classification. DEVCOM Army Research Laboratory, 2023. http://dx.doi.org/10.21236/ad1194755.
Der volle Inhalt der QuelleBardhan, Shuvo, Mitsuhiro Hatada, James Filliben, Douglas Montgomery, and Alexander Jia. An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.tn.2142.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Der volle Inhalt der QuelleAlbrecht, Jochen, Andreas Petutschnig, Laxmi Ramasubramanian, Bernd Resch, and Aleisha Wright. Comparing Twitter and LODES Data for Detecting Commuter Mobility Patterns. Mineta Transportation Institute, 2021. http://dx.doi.org/10.31979/mti.2021.2037.
Der volle Inhalt der Quelle