Academic literature on the topic 'Malicious traffic'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious traffic.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious traffic"
Thanushiya.S, Kiruthika.S, Mary selja. J, and Mr. JohnLivingston. "Network Traffic Analysis To Classify Malicious And Non-Malicious Traffic." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 02 (2025): 205–9. https://doi.org/10.47392/irjaeh.2025.0028.
Full textLi, Minghui, Zhendong Wu, Keming Chen, and Wenhai Wang. "Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis." Symmetry 14, no. 11 (2022): 2329. http://dx.doi.org/10.3390/sym14112329.
Full textLiu, Ying, Zhiqiang Wang, Shufang Pang, and Lei Ju. "Distributed Malicious Traffic Detection." Electronics 13, no. 23 (2024): 4720. http://dx.doi.org/10.3390/electronics13234720.
Full textBoukhtouta, Amine, Nour-Eddine Lakhdari, Serguei A. Mokhov, and Mourad Debbabi. "Towards Fingerprinting Malicious Traffic." Procedia Computer Science 19 (2013): 548–55. http://dx.doi.org/10.1016/j.procs.2013.06.073.
Full textYang, Jin, Xinyun Jiang, Gang Liang, Siyu Li, and Zicheng Ma. "Malicious Traffic Identification with Self-Supervised Contrastive Learning." Sensors 23, no. 16 (2023): 7215. http://dx.doi.org/10.3390/s23167215.
Full textZhang, Shuai, Yu Fan, Haoyi Zhou, and Bo Li. "MalDetectFormer: Leveraging Sparse SpatioTemporal Information for Effective Malicious Traffic Detection." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 21 (2025): 22533–41. https://doi.org/10.1609/aaai.v39i21.34411.
Full textBie, Mu, and Haoyu Ma. "Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning." Mathematical Problems in Engineering 2021 (November 18, 2021): 1–10. http://dx.doi.org/10.1155/2021/2983605.
Full textHou, Botao, Ke Zhang, Xiaojun Zuo, Jianli Zhao, and Bo Xi. "PIoT Malicious Traffic Detection Method Based on GAN Sample Enhancement." Security and Communication Networks 2022 (March 23, 2022): 1–12. http://dx.doi.org/10.1155/2022/9223412.
Full textWang, Wei, Cheng Sheng Sun, and Jia Ning Ye. "A Method for TLS Malicious Traffic Identification Based on Machine Learning." Advances in Science and Technology 105 (April 2021): 291–301. http://dx.doi.org/10.4028/www.scientific.net/ast.105.291.
Full textShi, Zhaolei, Nurbol Luktarhan, Yangyang Song, and Huixin Yin. "TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM." Entropy 25, no. 5 (2023): 821. http://dx.doi.org/10.3390/e25050821.
Full textDissertations / Theses on the topic "Malicious traffic"
Jin, Zhihua. "Visualization of Network Traffic to Detect Malicious Network Activity." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8951.
Full textNichols, Tony. "MalWebID_Autodetection and Identification of Malicious Web Hosts Through Live Traffic Analysis." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32875.
Full textSandford, Peter. "Inferring malicious network events in commercial ISP networks using traffic summarisation." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/9580.
Full textKälkäinen, J. (Juha). "Collection and analysis of malicious SSH traffic in Oulu University network." Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201812053224.
Full textWulff, Tobias. "Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5120.
Full textТокмань, І. О. "Інформаційна інтелектуальна технологія детектування шкідливого трафіку в мережах інтернету речей". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72290.
Full textFAVALE, THOMAS. "Strengthening Privacy and Cybersecurity through Anonymization and Big Data." Doctoral thesis, Politecnico di Torino, 2023. https://hdl.handle.net/11583/2975701.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Electronic Thesis or Diss., Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008.
Full textLakhdari, Nour-Eddine. "FINGERPRINTING MALICIOUS IP TRAFFIC." Thesis, 2014. http://spectrum.library.concordia.ca/978357/1/Lakhdari_MASc_S2014.pdf.
Full textBooks on the topic "Malicious traffic"
Book chapters on the topic "Malicious traffic"
Meda, Lakshmi N. K., and Hamid Jahankhani. "Artificial Intelligence Based Malicious Traffic Detection." In Blockchain and Other Emerging Technologies for Digital Business Strategies. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98225-6_2.
Full textYu, Yuqi, Hanbing Yan, Yuan Ma, Hao Zhou, and Hongchao Guan. "DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_11.
Full textKolbusz, J., P. Rozycki, and J. Korniak. "The Simulation of Malicious Traffic Using Self-similar Traffic Model." In Advances in Intelligent and Soft Computing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-23187-2_21.
Full textWu, Mengying, Zhendong Wu, Hao Lv, and Jingjing Wang. "A Method of Malicious Bot Traffic Detection." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_6.
Full textMillar, K., A. Cheng, H. G. Chew, and C. C. Lim. "Deep Learning for Classifying Malicious Network Traffic." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04503-6_15.
Full textZhang, Shijun, Shuo Li, and Jing Zeng. "Deep Learning-Based Malicious Illegal Traffic Identification." In Lecture Notes on Data Engineering and Communications Technologies. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1157-8_85.
Full textFang, Yong, Yijia Xu, Cheng Huang, Liang Liu, and Lei Zhang. "Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9343-4_10.
Full textKobayashi, Tiago H., Aguinaldo B. Batista, João Paulo S. Medeiros, José Macedo F. Filho, Agostinho M. Brito, and Paulo S. Motta Pires. "Analysis of Malicious Traffic in Modbus/TCP Communications." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03552-4_18.
Full textHublikar, Shivaraj, and N. Shekar V. Shet. "Hybrid Malicious Encrypted Network Traffic Flow Detection Model." In Computer Networks and Inventive Communication Technologies. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3035-5_28.
Full textShen, Yi, Yuhan Zhang, Yuwei Li, et al. "IoT Malicious Traffic Detection Based on Federated Learning." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56580-9_15.
Full textConference papers on the topic "Malicious traffic"
Li, Fuhao, Hongyu Wu, and Jielun Zhang. "Lightweight Diffusion Model for Synthesizing Malicious Network Traffic." In NAECON 2024 - IEEE National Aerospace and Electronics Conference. IEEE, 2024. http://dx.doi.org/10.1109/naecon61878.2024.10670640.
Full textSiwakoti, Yuba R., and Danda B. Rawat. "Detecting Malicious Traffic using JA3 Fingerprints Attributed ML Approach." In 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, 2024. http://dx.doi.org/10.1109/icdcsw63686.2024.00024.
Full textWang, Jie, Lili Yang, Jie Wu, and Jemal H. Abawajy. "Clustering analysis for malicious network traffic." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7997375.
Full textGhafir, Ibrahim, and Vaclav Prenosil. "Blacklist-based malicious IP traffic detection." In 2015 Global Conference on Communication Technologies (GCCT). IEEE, 2015. http://dx.doi.org/10.1109/gcct.2015.7342657.
Full textDjap, Ryandy, Charles Lim, and Kalpin Erlangga Silaen. "Malicious traffic analysis using Markov chain." In ICONETSI '22: International Conference on Engineering and Information Technology for Sustainable Industry. ACM, 2022. http://dx.doi.org/10.1145/3557738.3557849.
Full textMorais, Sávyo V., and Claudio M. Farias. "INXU: A Flow-Based Intrusion Prevention System for Home IoT Networks." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg_estendido.2022.224947.
Full textHussain, Alefiya, Yuri Pradkin, and John Heidemann. "Replay of malicious traffic in network testbeds." In 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2013. http://dx.doi.org/10.1109/ths.2013.6699022.
Full textGhafir, Ibrahim, and Vaclav Prenosil. "DNS traffic analysis for malicious domains detection." In 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2015. http://dx.doi.org/10.1109/spin.2015.7095337.
Full textYarochkin, Fyodor, Vladimir Kropotov, Yennun Huang, Guo-Kai Ni, Sy-Yen Kuo, and Ing-Yi Chen. "Investigating DNS traffic anomalies for malicious activities." In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE, 2013. http://dx.doi.org/10.1109/dsnw.2013.6615506.
Full textLing, Zhen, Junzhou Luo, Kui Wu, Wei Yu, and Xinwen Fu. "TorWard: Discovery of malicious traffic over Tor." In IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. IEEE, 2014. http://dx.doi.org/10.1109/infocom.2014.6848074.
Full textReports on the topic "Malicious traffic"
Bardhan, Shuvo, Mitsuhiro Hatada, James Filliben, Douglas Montgomery, and Alexander Jia. An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.tn.2142.
Full textHarriss, Lydia, and Zara Mir. Misuse of civilian drones. Parliamentary Office of Science and Technology, 2020. http://dx.doi.org/10.58248/pn610.
Full text