ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A connection pattern-based approach to detect network traffic anomalies in critical infrastructures
Proceedings of the Seventh European Workshop on System Security - EuroSec '14
◽
10.1145/2592791.2592792
◽
2014
◽
Cited By ~ 13
Author(s):
Béla Genge
◽
Dorin Adrian Rusu
◽
Piroska Haller
Keyword(s):
Network Traffic
◽
Critical Infrastructures
◽
Connection Pattern
Download Full-text
Related Documents
Cited By
References
Connection Pattern Based Android Network Traffic Clustering
2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC)
◽
10.1109/itoec.2018.8740644
◽
2018
◽
Author(s):
Chunlei Chen
◽
Huixiang Zhang
◽
Ming Qi
◽
Yonghui Zhang
◽
Peng Zhang
Keyword(s):
Network Traffic
◽
Connection Pattern
Download Full-text
Urban Local Network Traffic Assignment Method Based on Turning Splitof Intersection
International Conference on Transportation Engineering 2009
◽
10.1061/41039(345)152
◽
2009
◽
Author(s):
Hui Xiao
◽
Lijun Sun
Keyword(s):
Network Traffic
◽
Traffic Assignment
◽
Local Network
◽
Assignment Method
Download Full-text
Detection and Classification of Anomalies in Network Traffic Using Generalized Entropies and OC-SVM with Mahalanobis Kernel
10.3390/ecea-1-b004
◽
2014
◽
Author(s):
Jayro Santiago-Paz
◽
Deni Torres-Roman
◽
Angel Figueroa-Ypiña
Keyword(s):
Network Traffic
◽
Generalized Entropies
Download Full-text
Investigating the network traffic of Industry 4.0 applications – methodology and initial results
2020 16th International Conference on Network and Service Management (CNSM)
◽
10.23919/cnsm50824.2020.9269093
◽
2020
◽
Author(s):
Gabor Soos
◽
Daniel Ficzere
◽
Pal Varga
Keyword(s):
Network Traffic
◽
Industry 4.0
◽
Initial Results
Download Full-text
Network traffic application type identification based on gravitational clustering
Management Innovation and Information Technology
◽
10.2495/miit130251
◽
2014
◽
Cited By ~ 1
Author(s):
Dengyin Zhang
◽
Xiuyun Li
◽
Jianfei Liao
◽
Mingxiang Wang
Keyword(s):
Network Traffic
◽
Gravitational Clustering
Download Full-text
Network Traffic Encryption by IPSec
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v7i5.912915
◽
2019
◽
Vol 7
(5)
◽
pp. 912-915
Author(s):
Manoj Kumar
◽
Amit Kishor
Keyword(s):
Network Traffic
Download Full-text
Cyber-security risk assessment framework for critical infrastructures
Intelligent Automation & Soft Computing
◽
10.31209/2018.100000049
◽
2018
◽
pp. -1--1
◽
Cited By ~ 2
Author(s):
Zubair Baig
◽
Sherali Zeadally
Keyword(s):
Risk Assessment
◽
Cyber Security
◽
Critical Infrastructures
◽
Assessment Framework
◽
Security Risk
◽
Security Risk Assessment
Download Full-text
STATISTICAL METHODS FOR STUDYING NETWORK TRAFFIC
Information and Control Systems
◽
10.31799/1684-8853-2018-5-35-43
◽
2018
◽
pp. 35-43
Author(s):
T. M. Tatarnikova
Keyword(s):
Statistical Methods
◽
Network Traffic
Download Full-text
Network traffic prediction based on wavelet FARIMA model
Journal of Computer Applications
◽
10.3724/sp.j.1087.2011.00901
◽
2011
◽
Vol 31
(4)
◽
pp. 901-903
Author(s):
Yong SUN
◽
Guang-wei BAI
◽
Lu ZHAO
Keyword(s):
Network Traffic
◽
Traffic Prediction
Download Full-text
Net_Watch: A Tool for Network Traffic Analysis
SSRN Electronic Journal
◽
10.2139/ssrn.3545231
◽
2020
◽
Author(s):
Sumit Kumari
◽
Neetu Sharma
◽
Prashant Ahlawat
Keyword(s):
Network Traffic
◽
Traffic Analysis
◽
Network Traffic Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close