Gotowa bibliografia na temat „Analysis of encrypted network flow”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Analysis of encrypted network flow”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Analysis of encrypted network flow"
Yan, Xiaodan. "Deep Learning-Based Efficient Analysis for Encrypted Traffic." Applied Sciences 13, no. 21 (2023): 11776. http://dx.doi.org/10.3390/app132111776.
Pełny tekst źródłaJiang, Ziyu. "Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 89–95. http://dx.doi.org/10.54097/mwyge502.
Pełny tekst źródłaMa, Chencheng, Xuehui Du, and Lifeng Cao. "Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow." Electronics 9, no. 2 (2020): 324. http://dx.doi.org/10.3390/electronics9020324.
Pełny tekst źródłaMeghdouri, Fares, Tanja Zseby, and Félix Iglesias. "Analysis of Lightweight Feature Vectors for Attack Detection in Network Traffic." Applied Sciences 8, no. 11 (2018): 2196. http://dx.doi.org/10.3390/app8112196.
Pełny tekst źródłaAfzal, Asmara, Mehdi Hussain, Shahzad Saleem, M. Khuram Shahzad, Anthony T. S. Ho, and Ki-Hyun Jung. "Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App." Applied Sciences 11, no. 17 (2021): 7789. http://dx.doi.org/10.3390/app11177789.
Pełny tekst źródłaRavi, V., and A. S. Poornima. "SecMa: A Novel Multimodal Autoencoder Framework for Encrypted IoT Traffic Analysis and Attack Detection." Engineering, Technology & Applied Science Research 15, no. 3 (2025): 23020–26. https://doi.org/10.48084/etasr.10336.
Pełny tekst źródłaOh, Chaeyeon, Joonseo Ha, and Heejun Roh. "A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers." Applied Sciences 12, no. 1 (2021): 155. http://dx.doi.org/10.3390/app12010155.
Pełny tekst źródłaHaywood, Gregor Tamati, and Saleem Noel Bhatti. "Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths." Cryptography 8, no. 2 (2024): 22. http://dx.doi.org/10.3390/cryptography8020022.
Pełny tekst źródłaHu, Xinyi, Chunxiang Gu, Yihang Chen, and Fushan Wei. "CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method." Sensors 21, no. 24 (2021): 8231. http://dx.doi.org/10.3390/s21248231.
Pełny tekst źródłaVizitiu, Anamaria, Cosmin-Ioan Nita, Radu Miron Toev, Tudor Suditu, Constantin Suciu, and Lucian Mihai Itu. "Framework for Privacy-Preserving Wearable Health Data Analysis: Proof-of-Concept Study for Atrial Fibrillation Detection." Applied Sciences 11, no. 19 (2021): 9049. http://dx.doi.org/10.3390/app11199049.
Pełny tekst źródłaRozprawy doktorskie na temat "Analysis of encrypted network flow"
Toure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Pełny tekst źródłaIzadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Pełny tekst źródłaHeller, Mark D. "Behavioral analysis of network flow traffic." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5108.
Pełny tekst źródłaMcClenney, Walter O. "Analysis of the DES, LOKI, and IDEA algorithms for use in an encrypted voice PC network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA297919.
Pełny tekst źródłaKattadige, Chamara Manoj Madarasinghe. "Network and Content Intelligence for 360 Degree Video Streaming Optimization." Thesis, The University of Sydney, 2023. https://hdl.handle.net/2123/29904.
Pełny tekst źródłaDandachi, Najib H. "Network flow method for power system analysis." Thesis, Imperial College London, 1989. http://hdl.handle.net/10044/1/47398.
Pełny tekst źródłaMartin, Kevin M. "A geographic and functional network flow analysis tool." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42679.
Pełny tekst źródłaZickel, Michael J. "Using ecosystem network analysis to quantify fluid flow." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/2987.
Pełny tekst źródłaHerbert, Alan. "Bolvedere: a scalable network flow threat analysis system." Thesis, Rhodes University, 2019. http://hdl.handle.net/10962/71557.
Pełny tekst źródłaGlockner, Gregory D. "Dynamic network flow with uncertain arc capacities." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/30734.
Pełny tekst źródłaKsiążki na temat "Analysis of encrypted network flow"
Cherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9.
Pełny tekst źródłaWilliams-Sether, Tara. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaWilliams-Sether, Tara. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaWilliams-Sether, Tara. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaTara, Williams-Sether. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaTara, Williams-Sether. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaWilliams-Sether, Tara. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaTara, Williams-Sether. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaTara, Williams-Sether. Analysis of the peak-flow gaging network in North Dakota. U.S. Dept. of the Interior, U.S. Geological Survey, 1996.
Znajdź pełny tekst źródłaCzęści książek na temat "Analysis of encrypted network flow"
Cherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Encrypted Network Traffic Analysis." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_2.
Pełny tekst źródłaCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Detection of Anomalous Encrypted Traffic." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_4.
Pełny tekst źródłaCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Classification of Encrypted Network Traffic." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_3.
Pełny tekst źródłaCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Artificial Intelligence-Based Approaches for Anomaly Detection." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_5.
Pełny tekst źródłaCherukuri, Aswani Kumar, Sumaiya Thaseen Ikram, Gang Li, and Xiao Liu. "Introduction." In Encrypted Network Traffic Analysis. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-62909-9_1.
Pełny tekst źródłaRennels, Donald C., and Hobart M. Hudson. "Network Analysis." In Pipe Flow. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118275276.ch5.
Pełny tekst źródłaTian, Yu-Chu, and Jing Gao. "Traffic Flow Analysis." In Network Analysis and Architecture. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-5648-7_4.
Pełny tekst źródłaHublikar, Shivaraj, and N. Shekar V. Shet. "Hybrid Malicious Encrypted Network Traffic Flow Detection Model." In Computer Networks and Inventive Communication Technologies. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3035-5_28.
Pełny tekst źródłaGonen, Serkan, Gokce Karacayilmaz, Harun Artuner, Mehmet Ali Bariskan, and Ercan Nurcan Yilmaz. "Cyber Attack Detection with Encrypted Network Connection Analysis." In Lecture Notes in Mechanical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-6062-0_57.
Pełny tekst źródłaKolaczyk, Eric D., and Gábor Csárdi. "Analysis of Network Flow Data." In Use R! Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44129-6_9.
Pełny tekst źródłaStreszczenia konferencji na temat "Analysis of encrypted network flow"
Weber, Julia, Srivathsan Thirumurugan, Riyad Alshammari, et al. "Encrypted Network Traffic Analysis (ENTA) Platform: IMA VoIP Traffic Identification." In NOMS 2025-2025 IEEE Network Operations and Management Symposium. IEEE, 2025. https://doi.org/10.1109/noms57970.2025.11073738.
Pełny tekst źródłaFrancesco Gentile, Antonio, Emilio Greco, and Domenico Luca Carnì. "A Real Network Performance Analysis Testbed for Encrypted MQTT in DMS." In 2024 IEEE International Workshop on Metrology for Living Environment (MetroLivEnv). IEEE, 2024. http://dx.doi.org/10.1109/metrolivenv60384.2024.10615766.
Pełny tekst źródłaKhan Tanolli, Nabeel Ahmed, Ahmed Raza, and Asif Gulraiz. "Graph Neural Network Analysis Techniques for Power Flow Analysis." In 2025 International Conference on Emerging Technologies in Electronics, Computing, and Communication (ICETECC). IEEE, 2025. https://doi.org/10.1109/icetecc65365.2025.11070259.
Pełny tekst źródłaPrashal, Garima, Parasuraman Sumathi, and Narayana Prasad Padhy. "Interpretable Deep Bayesian Neural Network for Probabilistic Power Flow Analysis." In 2024 IEEE Power & Energy Society General Meeting (PESGM). IEEE, 2024. http://dx.doi.org/10.1109/pesgm51994.2024.10689085.
Pełny tekst źródłaJang, Junseo, and Jaehyun Hwang. "Impact Analysis of NUMA-Aware Flow Placement Based on Network Flow Size in Multicore Systems." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10826670.
Pełny tekst źródłaKim, Dongeon, Jihun Han, Jinwoo Lee, Heejun Roh, and Wonjun Lee. "Poster: Feasibility of Malware Traffic Analysis through TLS-Encrypted Flow Visualization." In 2020 IEEE 28th International Conference on Network Protocols (ICNP). IEEE, 2020. http://dx.doi.org/10.1109/icnp49622.2020.9259387.
Pełny tekst źródłaFu, Chuanpu, Qi Li, and Ke Xu. "Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis." In Network and Distributed System Security Symposium. Internet Society, 2023. http://dx.doi.org/10.14722/ndss.2023.23080.
Pełny tekst źródłaShahbar, Khalid, and A. Nur Zincir-Heywood. "How far can we push flow analysis to identify encrypted anonymity network traffic?" In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2018. http://dx.doi.org/10.1109/noms.2018.8406156.
Pełny tekst źródłaTalkington, Josh, Ram Dantu, and Kirill Morozov. "Verifying OAuth Implementations Through Encrypted Network Analysis." In SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies. ACM, 2019. http://dx.doi.org/10.1145/3322431.3326449.
Pełny tekst źródłaLiu, Chang, Longtao He, Gang Xiong, Zigang Cao, and Zhen Li. "FS-Net: A Flow Sequence Network For Encrypted Traffic Classification." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737507.
Pełny tekst źródłaRaporty organizacyjne na temat "Analysis of encrypted network flow"
Bethel, E. Wes. Query-Driven Network Flow Data Analysis and Visualization. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/888963.
Pełny tekst źródłaBrowning, D. W., and J. B. Thomas. A Numerical Analysis of a Queue with Network Access Flow Control,. Defense Technical Information Center, 1985. http://dx.doi.org/10.21236/ada157526.
Pełny tekst źródłaBonnett, Michaela, Chimdi Ezeigwe, Meaghan Kennedy, and Teri Garstka. Using Social Network Analysis to Link Community Health and Network Strength. Orange Sparkle Ball, 2023. http://dx.doi.org/10.61152/scsf6662.
Pełny tekst źródłaPatel, Reena. Complex network analysis for early detection of failure mechanisms in resilient bio-structures. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/41042.
Pełny tekst źródłaZhu, Zhihong, Yue Zhuo, Haitao Jin, Boyu Wu, and Zhijie Li. Chinese Medicine Therapies for Neurogenic Bladder after Spinal Cord Injury: A protocol for systematic review and network meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2021. http://dx.doi.org/10.37766/inplasy2021.8.0084.
Pełny tekst źródłaLoso, Michael, and Michael Loso. Glacier monitoring in the Central Alaska Network: Protocol narrative, version 1.0. National Park Service, 2025. https://doi.org/10.36967/2308209.
Pełny tekst źródłaWeissinger, Rebecca, Mary Moran, Steve Monroe, and Helen Thomas. Springs and seeps monitoring protocol for park units in the Northern Colorado Plateau Network, Version 1.1. National Park Service, 2023. http://dx.doi.org/10.36967/2299467.
Pełny tekst źródłaCandelaria, Christopher, Sergey Borisov, Galina Hale, and Julián Caballero. Bank Linkages and International Trade. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011522.
Pełny tekst źródłaRusso, David, Daniel M. Tartakovsky, and Shlomo P. Neuman. Development of Predictive Tools for Contaminant Transport through Variably-Saturated Heterogeneous Composite Porous Formations. United States Department of Agriculture, 2012. http://dx.doi.org/10.32747/2012.7592658.bard.
Pełny tekst źródłaSiebenaler. L52272 Detection of Small Leaks in Liquid Pipelines - Gap Study of Available Methods. Pipeline Research Council International, Inc. (PRCI), 2007. http://dx.doi.org/10.55274/r0010662.
Pełny tekst źródła