Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine-learning-based darknet traffic detection system for IoT applications
The massive modern technical revolution in electronics, cognitive computing, and sensing
has provided critical infrastructure for the development of today's Internet of Things (IoT) for a …
has provided critical infrastructure for the development of today's Internet of Things (IoT) for a …
Darknet traffic analysis: A systematic literature review
J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
[HTML][HTML] Darknet traffic classification and adversarial attacks using machine learning
N Rust-Nguyen, S Sharma, M Stamp - Computers & Security, 2023 - Elsevier
The anonymous nature of darknets is commonly exploited for illegal activities. Previous
research has employed machine learning and deep learning techniques to automate the …
research has employed machine learning and deep learning techniques to automate the …
The invisible arms race: digital trends in illicit goods trafficking and AI-enabled responses
I Mademlis, M Mancuso, C Paternoster… - … on Technology and …, 2024 - ieeexplore.ieee.org
Recent trends in the modus operandi of technologically-aware criminal groups engaged in
illicit goods trafficking (eg, firearms, drugs, cultural artifacts, etc.) have given rise to …
illicit goods trafficking (eg, firearms, drugs, cultural artifacts, etc.) have given rise to …
DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification
J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …
defensing cyber crimes. Although notable research efforts have been dedicated to …
Robust stacking ensemble model for darknet traffic classification under adversarial settings
Encrypted traffic tunnelled by Tor or VPN is referred to as darknet traffic. The ability to detect,
identify, and characterize darknet traffic is critical for detecting network traffic generated by a …
identify, and characterize darknet traffic is critical for detecting network traffic generated by a …
Darknet traffic analysis, and classification system based on modified stacking ensemble learning algorithms
A Almomani - Information Systems and e-Business Management, 2023 - Springer
Darknet, a source of cyber intelligence, refers to the internet's unused address space, which
people do not expect to interact with their computers. The establishment of security requires …
people do not expect to interact with their computers. The establishment of security requires …
Explainable artificial intelligence for feature selection in network traffic classification: A comparative study
Over the past decade, there has been a growing surge of interest in leveraging artificial
intelligence and machine learning models to address real‐world challenges within the field …
intelligence and machine learning models to address real‐world challenges within the field …
An intelligent network monitoring approach for online classification of Darknet traffic
The Internet plays a crucial role in supporting global applications and businesses, but
security remains a major challenge. Within the Internet, there exists a parallel network …
security remains a major challenge. Within the Internet, there exists a parallel network …
Using ensemble learning for securing public area networks from VPN malicious transmissions
In this paper, a new paradigm for network security is developed via the use of ensemble
learning. The primary objective of this study is to identify and stop the involvement of …
learning. The primary objective of this study is to identify and stop the involvement of …