Academic literature on the topic 'Encrypted Traffic Inspection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Encrypted Traffic Inspection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Encrypted Traffic Inspection"
Jia, Xi, and Meng Zhang. "Encrypted Packet Inspection Based on Oblivious Transfer." Security and Communication Networks 2022 (August 24, 2022): 1–13. http://dx.doi.org/10.1155/2022/4743078.
Full textNagwani, Karan. "AI-Powered Dynamic Web Filtering for Encrypted Traffic." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46497.
Full textHuang, Yung-Fa, Chuan-Bi Lin, Chien-Min Chung, and Ching-Mu Chen. "Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning." Electronics 10, no. 12 (2021): 1376. http://dx.doi.org/10.3390/electronics10121376.
Full textAlwhbi, Ibrahim A., Cliff C. Zou, and Reem N. Alharbi. "Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning." Sensors 24, no. 11 (2024): 3509. http://dx.doi.org/10.3390/s24113509.
Full textPapadogiannaki, Eva, and Sotiris Ioannidis. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–35. http://dx.doi.org/10.1145/3457904.
Full textPapadogiannaki, Eva, and Sotiris Ioannidis. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–35. https://doi.org/10.1145/3457904.
Full textEva, Papadogiannaki, and Ioannidis Sotiris. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–35. https://doi.org/10.1145/3475936.
Full textOh, Chaeyeon, Joonseo Ha, and Heejun Roh. "A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers." Applied Sciences 12, no. 1 (2021): 155. http://dx.doi.org/10.3390/app12010155.
Full textFarooq, Irfan, Syed Aale Ahmed, Asfar Ali, Muhammad Ali Warraich, Muhammad Aqeel, and Hamayun Khan. "Enhanced Classification of Networks Encrypted Traffic: A Conceptual Analysis of Security Assessments, Implementation, Trends and Future Directions." Asian Bulletin of Big Data Management 4, no. 4 (2024): 500–522. https://doi.org/10.62019/abbdm.v4i4.287.
Full textJiang, Ziyu. "Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 89–95. http://dx.doi.org/10.54097/mwyge502.
Full textDissertations / Theses on the topic "Encrypted Traffic Inspection"
Esteves, André Filipe Ferreira. "Detection of encrypted traffic generated by peer-to-peer live streaming applications using deep packet inspection." Master's thesis, 2011. http://hdl.handle.net/10400.6/3733.
Full textCarvalho, David Alexandre Milheiro de. "Towards the detection of encrypted peer-to-peer file sharing traffic and peer-to-peer TV traffic using deep packet inspection methods." Master's thesis, 2009. http://hdl.handle.net/10400.6/3870.
Full textAlshammari, Riyad. "Automatically Generating Robust Signatures Using a Machine Learning Approach to Unveil Encrypted VoIP Traffic Without Using Port Numbers, IP Addresses and Payload Inspection." Thesis, 2012. http://hdl.handle.net/10222/14872.
Full textBook chapters on the topic "Encrypted Traffic Inspection"
Carvalho, David A., Manuela Pereira, and Mário M. Freire. "Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection." In Security Technology. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10847-1_33.
Full textKarthikeyan, Shivani, Shrish K. S, Arunkumar J, and Bagavathi C. "Securing Networks with Precision: Unveiling the Potential of Application Protocol Based Intrusion Detection Systems." In Advancements in Intelligent Systems. Soft Computing Research Society, 2024. https://doi.org/10.56155/978-81-975670-3-2-5.
Full textHayward, Gil. "The British Tunny Machine." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0034.
Full textConference papers on the topic "Encrypted Traffic Inspection"
Schiff, Liron, and Stefan Schmid. "PRI: Privacy Preserving Inspection of Encrypted Network Traffic." In 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 2016. http://dx.doi.org/10.1109/spw.2016.34.
Full textMB, Anushlin Leena, Jegana R, and Abitha Rose P. "Network Traffic Identification Based On Machine Learning and Deep Packet Inspection." In 7th International Conference on Recent Innovations in Computer and Communication (ICRICC 23). International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/bdfm3626/icricc23p27.
Full textDeri, Luca, and Daniele Sartiano. "Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis." In 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2020. http://dx.doi.org/10.23919/icitst51030.2020.9351330.
Full text