From post

When a RF beats a CNN and GRU, together - A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification.

, , , , и . Comput. Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal Security Verification of Transport Protocols for Wireless Sensor Networks., , и . ICCSAMA, том 282 из Advances in Intelligent Systems and Computing, стр. 389-403. Springer, (2014)MiSAL - A minimal quality representation switch logic for adaptive streaming., , , , , и . Multim. Tools Appl., 78 (18): 26483-26508 (2019)SDN Wireless Controller Placement Problem-The 4G LTE-U Case., , , , и . IEEE Access, (2021)Clustering the Unknown - The Youtube Case., , , и . ICNC, стр. 402-407. IEEE, (2019)Novel ad insertion technique for MPEG-DASH., , , , и . CCNC, стр. 582-587. IEEE, (2015)When the Guard failed the Droid: A case study of Android malware., , и . CoRR, (2020)Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application., , , , , , и . CCNC, стр. 1-6. IEEE, (2017)Video complexity hybrid traffic shaping for HTTP Adaptive Streaming., , , , и . CCNC, стр. 683-688. IEEE, (2015)Power-aware recovery for geographic routing., и . WCNC, стр. 2851-2856. IEEE, (2009)Securing Road Traffic Congestion Detection by Incorporating V2I Communications., , и . WOWMOM, стр. 1-6. IEEE Computer Society, (2018)