Deep learning with graph convolutional networks: An overview and latest applications in computational intelligence

UA Bhatti, H Tang, G Wu, S Marjan… - International Journal of …, 2023 - Wiley Online Library
Convolutional neural networks (CNNs) have received widespread attention due to their
powerful modeling capabilities and have been successfully applied in natural language …

Artificial intelligence-based anomaly detection technology over encrypted traffic: a systematic literature review

IH Ji, JH Lee, MJ Kang, WJ Park, SH Jeon, JT Seo - Sensors, 2024 - mdpi.com
As cyber-attacks increase in unencrypted communication environments such as the
traditional Internet, protected communication channels based on cryptographic protocols …

Tfe-gnn: A temporal fusion encoder using graph neural networks for fine-grained encrypted traffic classification

H Zhang, L Yu, X **ao, Q Li, F Mercaldo… - Proceedings of the ACM …, 2023 - dl.acm.org
Encrypted traffic classification is receiving widespread attention from researchers and
industrial companies. However, the existing methods only extract flow-level features, failing …

TCGNN: Packet-grained network traffic classification via Graph Neural Networks

G Hu, X **ao, M Shen, B Zhang, X Yan, Y Liu - Engineering Applications of …, 2023 - Elsevier
Network traffic classification is the fundamental and vital function for network management,
network security and so on. With the traffic scenarios becoming more and more complex …

Enhanced malicious traffic detection in encrypted communication using TLS features and a multi-class classifier ensemble

C Kondaiah, AR Pais, RS Rao - Journal of Network and Systems …, 2024 - Springer
The use of encryption for network communication leads to a significant challenge in
identifying malicious traffic. The existing malicious traffic detection techniques fail to identify …

CT-GCN: A phishing identification model for blockchain cryptocurrency transactions

B Fu, X Yu, T Feng - International Journal of Information Security, 2022 - Springer
With the widespread application of blockchain technology, the cyberspace security issue of
phishing has also appeared in the emerging blockchain cryptocurrency ecosystem. Because …

GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism

J Chen, H **e, S Cai, L Song, B Geng, W Guo - Computers & Security, 2024 - Elsevier
With the increasing size and complexity of network, network traffic becomes more and more
correlated with each other, and the traditional manner of presenting network traffic in a …

Detecting malicious IoT network communication through Graph Neural Networks in real-world conditions

V Carletti, P Foggia, F Rosa, M Vento - Pattern Recognition Letters, 2025 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly permeating homes, industries, and
many other environments. The need for robust security measures in IoT networks has never …

[HTML][HTML] A graph representation framework for encrypted network traffic classification

Z Okonkwo, E Foo, Z Hou, Q Li, Z Jadidi - Computers & Security, 2025 - Elsevier
Abstract Network Traffic Classification (NTC) is crucial for ensuring internet security, but
encryption presents significant challenges to this task. While Machine Learning (ML) and …

A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency

L Yu, J Yuan, J Zheng, N Yang - Journal of Network and Systems …, 2025 - Springer
As the Internet industry evolves, the need for effective encrypted traffic classification (ETC)
becomes critical for network management and cybersecurity. Meanwhile, existing deep …