ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Zero-Day Traffic Identification
Cyberspace Safety and Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-03584-0_16
◽
2013
◽
pp. 213-227
◽
Cited By ~ 2
Author(s):
Jun Zhang
◽
Xiao Chen
◽
Yang Xiang
◽
Wanlei Zhou
Keyword(s):
Traffic Identification
Download Full-text
Related Documents
Cited By
References
A Fingerprint Enhancement and Second-Order Markov Chain Based Malicious Encrypted Traffic Identification Scheme
Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence
◽
10.1145/3404555.3404590
◽
2020
◽
Author(s):
Daichong Chao
Keyword(s):
Markov Chain
◽
Second Order
◽
Identification Scheme
◽
Traffic Identification
◽
Fingerprint Enhancement
◽
Order Markov Chain
◽
Encrypted Traffic
Download Full-text
Peer-to-Peer Traffic Identification by Mining IP Layer Data Streams Using Concept-Adapting Very Fast Decision Tree
2008 20th IEEE International Conference on Tools with Artificial Intelligence
◽
10.1109/ictai.2008.12
◽
2008
◽
Cited By ~ 17
Author(s):
Bijan Raahemi
◽
Weicai Zhong
◽
Jing Liu
Keyword(s):
Decision Tree
◽
Data Streams
◽
Peer To Peer
◽
Traffic Identification
◽
Very Fast Decision Tree
◽
Fast Decision
Download Full-text
Better network traffic identification through the independent combination of techniques
Journal of Network and Computer Applications
◽
10.1016/j.jnca.2010.02.002
◽
2010
◽
Vol 33
(4)
◽
pp. 433-446
◽
Cited By ~ 43
Author(s):
Arthur Callado
◽
Judith Kelner
◽
Djamel Sadok
◽
Carlos Alberto Kamienski
◽
Stênio Fernandes
Keyword(s):
Network Traffic
◽
Traffic Identification
Download Full-text
Algorithm Comparison of P2P Traffic Identification Based on Deep Packet Inspection
2009 International Symposium on Computer Network and Multimedia Technology
◽
10.1109/cnmt.2009.5374593
◽
2009
◽
Cited By ~ 2
Author(s):
Hongwei Chen
◽
Fangping You
◽
Xin Zhou
◽
Chunzhi Wang
Keyword(s):
Deep Packet Inspection
◽
Traffic Identification
◽
Algorithm Comparison
◽
Packet Inspection
Download Full-text
Research of P2P Traffic Identification Based on BP Neural Network
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
◽
10.1109/iih-msp.2007.260
◽
2007
◽
Cited By ~ 4
Author(s):
Fuke Shen
◽
Change Pan
◽
Xiaoli Ren
Keyword(s):
Neural Network
◽
Bp Neural Network
◽
Traffic Identification
Download Full-text
P2P traffic identification based on transfer learning
2013 IEEE International Conference on Granular Computing (GrC)
◽
10.1109/grc.2013.6740374
◽
2013
◽
Author(s):
Lin Cai
◽
Xiaojun Jing
◽
Songlin Sun
◽
Hai Huang
◽
Na Chen
◽
...
Keyword(s):
Transfer Learning
◽
Traffic Identification
Download Full-text
Encrypted 5G Over- The- Top Voice Traffic Identification Based on Deep Learning
10.1109/iscc53001.2021.9631458
◽
2021
◽
Author(s):
Zhuang Qiao
◽
Liuqun Zhai
◽
Shunliang Zhang
◽
Xiaohui Zhang
Keyword(s):
Deep Learning
◽
Traffic Identification
◽
Voice Traffic
◽
Over The Top
Download Full-text
A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm
2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
◽
10.1109/idaacs.2015.7341451
◽
2015
◽
Cited By ~ 4
Author(s):
Chunzhi Wang
◽
Huili Zhang
◽
Zhiwei Ye
◽
Yuanli Du
Keyword(s):
Support Vector Machine
◽
Artificial Bee Colony Algorithm
◽
Artificial Bee Colony
◽
Peer To Peer
◽
Support Vector
◽
Traffic Identification
◽
Identification Method
◽
Bee Colony
Download Full-text
Learning from imbalanced data for encrypted traffic identification problem
Proceedings of the Seventh Symposium on Information and Communication Technology - SoICT '16
◽
10.1145/3011077.3011132
◽
2016
◽
Cited By ~ 5
Author(s):
Ly Vu
◽
Dong Van Tra
◽
Quang Uy Nguyen
Keyword(s):
Imbalanced Data
◽
Identification Problem
◽
Traffic Identification
◽
Encrypted Traffic
Download Full-text
A New Network Traffic Identification Base on Deep Factorization Machine
Intelligence Science and Big Data Engineering. Big Data and Machine Learning - Lecture Notes in Computer Science
◽
10.1007/978-3-030-36204-1_17
◽
2019
◽
pp. 209-218
Author(s):
Zhenxing Xu
◽
Junyi Zhang
◽
Daoqiang Zhang
◽
Hanyu Wei
Keyword(s):
Network Traffic
◽
Traffic Identification
◽
Factorization Machine
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close