• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4612466)   Today's Articles (4074)   Subscriber (49383)
For: Wang Z, Fok KW, Thing VL. Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study. Comput Secur 2022;113:102542. [DOI: 10.1016/j.cose.2021.102542] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
Number Cited by Other Article(s)
1
Ji IH, Lee JH, Kang MJ, Park WJ, Jeon SH, Seo JT. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review. SENSORS (BASEL, SWITZERLAND) 2024;24:898. [PMID: 38339615 PMCID: PMC10857182 DOI: 10.3390/s24030898] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2023] [Revised: 12/31/2023] [Accepted: 01/26/2024] [Indexed: 02/12/2024]
2
Yang J, Jiang X, Liang G, Li S, Ma Z. Malicious Traffic Identification with Self-Supervised Contrastive Learning. SENSORS (BASEL, SWITZERLAND) 2023;23:7215. [PMID: 37631752 PMCID: PMC10459182 DOI: 10.3390/s23167215] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/16/2023] [Revised: 08/04/2023] [Accepted: 08/10/2023] [Indexed: 08/27/2023]
3
Wang Z, Thing VL. Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103143] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/18/2023]
4
Lichy A, Bader O, Dubin R, Dvir A, Hajaj C. When a RF Beats a CNN and GRU, Together - A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103000] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
5
Pandurangan R, Jayaseelan SM, Rajalingam S, Angelo KM. A novel hybrid machine learning approach for traffic sign detection using CNN-GRNN. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2022. [DOI: 10.3233/jifs-221720] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA