Journal articles on the topic 'Encrypted Traffic Inspection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Encrypted Traffic Inspection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jia, Xi, and Meng Zhang. "Encrypted Packet Inspection Based on Oblivious Transfer." Security and Communication Networks 2022 (August 24, 2022): 1–13. http://dx.doi.org/10.1155/2022/4743078.
Full textNagwani, Karan. "AI-Powered Dynamic Web Filtering for Encrypted Traffic." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46497.
Full textHuang, Yung-Fa, Chuan-Bi Lin, Chien-Min Chung, and Ching-Mu Chen. "Research on QoS Classification of Network Encrypted Traffic Behavior Based on Machine Learning." Electronics 10, no. 12 (2021): 1376. http://dx.doi.org/10.3390/electronics10121376.
Full textAlwhbi, Ibrahim A., Cliff C. Zou, and Reem N. Alharbi. "Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning." Sensors 24, no. 11 (2024): 3509. http://dx.doi.org/10.3390/s24113509.
Full textPapadogiannaki, Eva, and Sotiris Ioannidis. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–35. http://dx.doi.org/10.1145/3457904.
Full textPapadogiannaki, Eva, and Sotiris Ioannidis. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–35. https://doi.org/10.1145/3457904.
Full textEva, Papadogiannaki, and Ioannidis Sotiris. "A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–35. https://doi.org/10.1145/3475936.
Full textOh, Chaeyeon, Joonseo Ha, and Heejun Roh. "A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers." Applied Sciences 12, no. 1 (2021): 155. http://dx.doi.org/10.3390/app12010155.
Full textFarooq, Irfan, Syed Aale Ahmed, Asfar Ali, Muhammad Ali Warraich, Muhammad Aqeel, and Hamayun Khan. "Enhanced Classification of Networks Encrypted Traffic: A Conceptual Analysis of Security Assessments, Implementation, Trends and Future Directions." Asian Bulletin of Big Data Management 4, no. 4 (2024): 500–522. https://doi.org/10.62019/abbdm.v4i4.287.
Full textJiang, Ziyu. "Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 89–95. http://dx.doi.org/10.54097/mwyge502.
Full textPapadogiannaki, Eva, and Sotiris Ioannidis. "Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware." Sensors 21, no. 4 (2021): 1140. http://dx.doi.org/10.3390/s21041140.
Full textK., Geetharani, Kowsalya K., and M. SenthilKumar |. M. S. Vijaykumar |. M. Saravanakumar A. "Defensing Confidentiality During Complete Packet Inspection On A Middlebox." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 82–84. https://doi.org/10.31142/ijtsrd10725.
Full textMisra, Udit. "TLENVOY - A Tool for TLS Termination and Inspection." Eastasouth Journal of Information System and Computer Science 2, no. 03 (2025): 200–204. https://doi.org/10.58812/esiscs.v2i03.489.
Full textNdichu, Samuel, Sylvester McOyowo, Henry Okoyo, and Cyrus Wekesa. "Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods." International Journal of Computer Network and Information Security 15, no. 2 (2023): 48–61. http://dx.doi.org/10.5815/ijcnis.2023.02.04.
Full textSancho, Jorge, José García, and Álvaro Alesanco. "Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8856379.
Full textSancho, Jorge, José García, and Álvaro Alesanco. "Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries." Security and Communication Networks 2020 (June 7, 2020): 8856379. https://doi.org/10.1155/2020/8856379.
Full textIliyasu, Auwal Sani, Ibrahim Abba, Badariyya Sani Iliyasu, and Abubakar Sadiq Muhammad. "A Review of Deep Learning Techniques for Encrypted Traffic Classification." Computational Intelligence and Machine Learning 3, no. 2 (2022): 15–21. http://dx.doi.org/10.36647/ciml/03.02.a003.
Full textÇelebi, Merve, and Uraz Yavanoğlu. "Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU." Applied Sciences 13, no. 14 (2023): 8104. http://dx.doi.org/10.3390/app13148104.
Full textAlshammari, Riyad, and A. Nur Zincir-Heywood. "Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?" Computer Networks 55, no. 6 (2011): 1326–50. http://dx.doi.org/10.1016/j.comnet.2010.12.002.
Full textJi, Il Hwan, Ju Hyeon Lee, Min Ji Kang, Woo Jin Park, Seung Ho Jeon, and Jung Taek Seo. "Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review." Sensors 24, no. 3 (2024): 898. http://dx.doi.org/10.3390/s24030898.
Full textMeghdouri, Fares, Tanja Zseby, and Félix Iglesias. "Analysis of Lightweight Feature Vectors for Attack Detection in Network Traffic." Applied Sciences 8, no. 11 (2018): 2196. http://dx.doi.org/10.3390/app8112196.
Full textYALDA, Khirota, Diyar Jamal HAMAD, and Nicolae TAPUS. "Network Traffic Prediction Performance Using LSTM." Romanian Journal of Information Science and Technology 27, no. 3-4 (2024): 336–47. http://dx.doi.org/10.59277/romjist.2024.3-4.07.
Full textФЕДЧУК, ТАРАС, та ТЕТЯНА КОРОБЕЙНІКОВА. "ГІБРИДНИЙ МЕТОД АНАЛІЗУ ТА ІДЕНТИФІКАЦІЇ ШКІДЛИВОГО DOH-ТРАФІКУ". Herald of Khmelnytskyi National University. Technical sciences 341, № 5 (2024): 438–47. https://doi.org/10.31891/2307-5732-2024-341-5-64.
Full textHsu, Fu-Hau, Chih-Wen Ou, Yan-Ling Hwang, Ya-Ching Chang, and Po-Ching Lin. "Detecting Web-Based Botnets Using Bot Communication Traffic Features." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/5960307.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textGomez, Gibran, Platon Kotzias, Matteo Dell’Amico, Leyla Bilge, and Juan Caballero. "Unsupervised Detection and Clustering of Malicious TLS Flows." Security and Communication Networks 2023 (January 12, 2023): 1–17. http://dx.doi.org/10.1155/2023/3676692.
Full textAmamra, Abdelfattah, and Vincent Terrelonge. "Multiple Kernel Transfer Learning for Enhancing Network Intrusion Detection in Encrypted and Heterogeneous Network Environments." Electronics 14, no. 1 (2024): 80. https://doi.org/10.3390/electronics14010080.
Full textPonomarenko, Roman Evgenevich, Vladislav Igorevich Egorov, and Aleksandr Igorevich Getman. "Challenges in the implementation of systems for deep packet inspection by the method of full protocol decoding." Proceedings of the Institute for System Programming of the RAS 35, no. 4 (2023): 45–64. http://dx.doi.org/10.15514/ispras-2023-35(4)-2.
Full textTarek, Ayad H. Shaladi, Taher R. Nashnosh Mohamed, and Mahmoud Alkabir Mohamed. "Forest Tree AI-SDN Firewall: A Hierarchical Architecture for Adaptive Network Security." International Journal of Current Science Research and Review 08, no. 05 (2025): 2519–30. https://doi.org/10.5281/zenodo.15525898.
Full textTalabani, Hardi Sabah, Zrar Khalid Abdul, and Hardi Mohammed Mohammed Saleh. "DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization." Future Internet 17, no. 5 (2025): 211. https://doi.org/10.3390/fi17050211.
Full textSudhanshu, Sekhar Tripathy, and Behera Bichitrananda. "EVALUATION OF FUTURE PERSPECTIVES ON SNORT AND WIRESHARK AS TOOLS AND TECHNIQUES FOR INTRUSION DETECTION SYSTEM." Industrial Engineering Journal 53, no. 10 (2024): 18–40. https://doi.org/10.5281/zenodo.14213834.
Full textHASANI, Anri, and Malvina NIKLEKAJ. "Security of VPNs in High-Surveillance Environments - A Comparative Study of VPN Alternatives." INGENIOUS 5, no. 1 (2025): 108–16. https://doi.org/10.58944/cwql3216.
Full textVeicht, Alexander, Cedric Renggli, and Diogo Barradas. "DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 188–205. http://dx.doi.org/10.56553/popets-2023-0047.
Full textResearcher. "THE ROLE OF NEXT-GENERATION FIREWALLS IN MODERN NETWORK SECURITY: A COMPREHENSIVE ANALYSIS." International Journal of Advanced Research in Engineering and Technology (IJARET) 15, no. 4 (2024): 135–54. https://doi.org/10.5281/zenodo.13643404.
Full textSharma M, Prof Sahana. "Encrypted Flow Intelligence: A Literature Review of AI Models for Traffic-Based Threat Detection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47998.
Full textJo, Minwoo, Hayong Jeong, Binwon Song, and Heeseung Jo. "Encrypted Traffic Decryption Tools: Comparative Performance Analysis and Improvement Guidelines." Electronics 13, no. 14 (2024): 2876. http://dx.doi.org/10.3390/electronics13142876.
Full textJi, Xiaoyu, Yushi Cheng, Wenyuan Xu, and Xinyan Zhou. "User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes." Security and Communication Networks 2018 (September 25, 2018): 1–10. http://dx.doi.org/10.1155/2018/3980371.
Full textSubahi, Alanoud, and George Theodorakopoulos. "Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic." Sensors 19, no. 21 (2019): 4777. http://dx.doi.org/10.3390/s19214777.
Full textMohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur, and Iman Hazwam Abd Halim. "SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network." Journal of Computing Research and Innovation 6, no. 4 (2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.
Full textJyoti Pandey, Shruti Rai, and Srivaramangai R. "Assessment of Deep Packet Inspection System of Network traffic and Anomaly Detection." International Journal of Scientific Research in Science, Engineering and Technology, June 6, 2023, 680–88. http://dx.doi.org/10.32628/ijsrset23103108.
Full textLiu, Qin, Yu Peng, Hongbo Jiang, et al. "SlimBox: Lightweight Packet Inspection Over Encrypted Traffic." IEEE Transactions on Dependable and Secure Computing, 2022, 1–12. http://dx.doi.org/10.1109/tdsc.2022.3222533.
Full textPham, Vinh, Eunil Seo, and Tai-Myoung Chung. "Lightweight Convolutional Neural Network Based Intrusion Detection System." Journal of Communications, 2020, 808–17. http://dx.doi.org/10.12720/jcm.15.11.808-817.
Full textPapadogiannaki, Eva, and Sotiris Ioannidis. "Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware." Sensors 2021, 21(4), 1140, January 26, 2021. https://doi.org/10.3390/s21041140.
Full textEva, Papadogiannaki, and Ioannidis Sotiris. "Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware." MDPI Journal "Sensors" - Special Issue: "Selected Papers from the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2020, February 1, 2021. https://doi.org/10.5281/zenodo.6787351.
Full textChen, Dajiang, Hao Wang, Ning Zhang, et al. "Privacy-Preserving Encrypted Traffic Inspection with Symmetric Cryptographic Techniques in IoT." IEEE Internet of Things Journal, 2022, 1. http://dx.doi.org/10.1109/jiot.2022.3155355.
Full textZhang, Kai, Minjun Deng, Bei Gong, Yinbin Miao, and Jianting Ning. "Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-based Industrial IoT." IEEE Internet of Things Journal, 2023, 1. http://dx.doi.org/10.1109/jiot.2023.3297601.
Full textSeok, Byoungjin, and Kiwook Sohn. "Adversarial Attacks on Pre-trained Deep Learning Models for Encrypted Traffic Analysis." Journal of Web Engineering, November 4, 2024, 749–68. http://dx.doi.org/10.13052/jwe1540-9589.2361.
Full textÇELEBİ, Merve, Alper ÖZBİLEN, and Uraz YAVANOĞLU. "Modern ağ trafiği analizi için derin paket incelemesi hakkında kapsamlı bir çalışma: sorunlar ve zorluklar." Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi, November 14, 2022. http://dx.doi.org/10.28948/ngumuh.1184020.
Full textShaladi, Tarek Ayad H., Mohamed Taher R. Nashnosh, and Mohamed Mahmoud Alkabir. "Forest Tree AI-SDN Firewall: A Hierarchical Architecture for Adaptive Network Security." International Journal of Current Science Research and Review 08, no. 05 (2025). https://doi.org/10.47191/ijcsrr/v8-i5-62.
Full textPatel, Vishva, Hitasvi Shukla, and Aashka Raval. "Enhancing Botnet Detection With Machine Learning And Explainable AI: A Step Towards Trustworthy AI Security." International Journal For Multidisciplinary Research 7, no. 2 (2025). https://doi.org/10.36948/ijfmr.2025.v07i02.39353.
Full text