Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
S Rani, K Tripathi, A Kumar - International Journal on Interactive Design …, 2023 - Springer
In the last decade, the number of computer malware has grown rapidly. Currently,
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
cybercriminals typically use malicious software (malware) as a means of attacking industrial …
BoAu: Malicious traffic detection with noise labels based on boundary augmentation
Q Yuan, C Liu, W Yu, Y Zhu, G **ong, Y Wang… - Computers & Security, 2023 - Elsevier
The effectiveness of deep-learning-based malicious traffic detection systems relies on high-
quality labeled traffic datasets. However, malicious traffic labeling approaches can easily …
quality labeled traffic datasets. However, malicious traffic labeling approaches can easily …
PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics
Cobalt Strike is the most prevalent attack tool abused by cyber-criminals to achieve
command and control on victim hosts over HTTPS traffics. It appears in many ransomware …
command and control on victim hosts over HTTPS traffics. It appears in many ransomware …
OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification
Internet traffic classification plays a key role in network visibility, Quality of Services (QoS),
intrusion detection, Quality of Experience (QoE) and traffic-trend analyses. In order to …
intrusion detection, Quality of Experience (QoE) and traffic-trend analyses. In order to …
The art of time-bending: Data augmentation and early prediction for efficient traffic classification
The accurate identification of internet traffic is crucial for network management. However, the
use of encryption techniques and constant changes in network protocols make it difficult to …
use of encryption techniques and constant changes in network protocols make it difficult to …
[HTML][HTML] Growth-adaptive distillation compressed fusion model for network traffic identification based on IoT cloud–edge collaboration
Y Yang, C Fan, S Chen, Z Gao, L Rui - Ad Hoc Networks, 2025 - Elsevier
The development of the Internet of Things (IoT) has led to the rapid growth of the types and
number of connected devices and has generated large amounts of complex and diverse …
number of connected devices and has generated large amounts of complex and diverse …
Malicious Encrypted Network Traffic Detection using Deep Auto-Encoder with A Custom Reconstruction Loss
Current security solutions face significant challenges in dealing with the ever-increasing
complexity and sophistication of cyber-attacks. This is particularly true for the solutions that …
complexity and sophistication of cyber-attacks. This is particularly true for the solutions that …
A novel approach for end-to-end navigation for real mobile robots using a deep hybrid model
The ability to use a single camera for indoor navigation of a real mobile robot can help
develop a complete navigation system, eliminating the need to use a traditional navigation …
develop a complete navigation system, eliminating the need to use a traditional navigation …
A robust supervised machine learning based approach for offline-online traffic classification of software-defined networking
Due to the exponential increase of internet applications and network users, network traffic
classification (NTC) is a crucial study subject. It successfully improves network service …
classification (NTC) is a crucial study subject. It successfully improves network service …
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy
Using deep learning models to deal with the classification tasks in network traffic offers a
new approach to address the imbalanced Internet of Things malicious traffic classification …
new approach to address the imbalanced Internet of Things malicious traffic classification …