This work is licensed under the Creative Commons Attribution 4.0 International License.
Hublikar, S., & Shet, N. S. V. (2024). Malicious encrypted network traffic flow detection using enhanced optimal deep feature selection with dlstm. International Journal of Modeling, Simulation, and Scientific Computing, 15(01).Search in Google Scholar
Dandil, E. (2020). C-nsa: a hybrid approach based on articial immune algorithms for anomaly detection in web traffic. IET Information Security, 14(3).Search in Google Scholar
Reddy, K. K., Behera, H. S., Nayak, J., Vijayakumar, P., Naik, B., & Singh, P. K. (2020). Deep neural network based anomaly detection in internet of things network traffic tracking for the applications of future smart cities. Transactions on Emerging Telecommunications Technologies.Search in Google Scholar
Lv, P., Pan, S., & Xu, J. (2020). Wifi-based virtual access network scheduling for downlink traffic dominated smart spaces. Mobile Information Systems, 2020, 1–9.Search in Google Scholar
Xie, K., Li, X., Wang, X., Xie, G., Wen, J., & Cao, J., et al. (2017). Fast tensor factorization for accurate internet anomaly detection. IEEE/ACM Transactions on Networking, PP(6), 1–14.Search in Google Scholar
Zeng, X., Chen, X., Shao, G., He, T., Han, Z., & Wen, Y., et al. (2019). Flow context and host behavior based shadowsocks’s traffic identification. IEEE Access, 7, 41017–41032.Search in Google Scholar
Wang, J., Jia, S., Zhao, H., Xu, J., & Lin, C. (2017). Internet anomaly detection based on complex network path. IEICE Transactions on Communications(12).Search in Google Scholar
Guo, H., & Heidemann, J. (2020). Detecting iot devices in the internet. IEEE/ACM Transactions on Networking, 28(5), 1–14.Search in Google Scholar
Pokuri, S. R., & Devarakonda, N. (2022). Anomaly detection using hybrid neuro genetic model. Journal of Interconnection Networks.Search in Google Scholar
Xu, X., Li, D., Sun, M., Yang, S., Yu, S. J., & Manogaran, G., et al. (2019). Research on key technologies of smart campus teaching platform based on 5g network. IEEE Access, 1–1.Search in Google Scholar
Han, Weijie, Xue, Jingfeng, Yan, & Hui. (2019). Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. IET Information Security.Search in Google Scholar
Nevat, I., Divakaran, D. M., Nagarajan, S. G., Zhang, P., Su, L., & Ko, L. L., et al. (2018). Anomaly detection and attribution in networks with temporally correlated traffic. IEEE/ACM Transactions on Networking, PP(1), 131–144.Search in Google Scholar
Duan, X., Fu, Y., & Wang, K. (2023). Network traffic anomaly detection method based on multi-scale residual classifier. Comput. Commun., 198, 206–216.Search in Google Scholar
Zahariadis, T. (2021). Network traffic anomaly detection via deep learning. Information, 12.Search in Google Scholar
Gajewski, M., Batalla, J. M., Mastorakis, G., & Mavromoustakis, C. X. (2020). Anomaly traffic detection and correlation in smart home automation iot systems. Transactions on Emerging Telecommunications Technologies (9).Search in Google Scholar
Wang, J., Zhao, H., Xu, J., Li, H., Zhu, H., & Chao, S., et al. (2018). Using intuitionistic fuzzy set for anomaly detection of network traffic from flow interaction. IEEE Access, 6, 64801–64816.Search in Google Scholar
Perez, DanielAlonso, SerafinMoran, AntonioPrada, Miguel A.Fuertes, Juan JoseDominguez, Manuel. (2021). Evaluation of feature learning for anomaly detection in network traffic. Evolving Systems, 12(1).Search in Google Scholar
Bie, M., Ma, H., & Chen, Y. (2021). Malicious mining behavior detection system of encrypted digital currency based on machine learning. Mathematical Problems in Engineering, 2021.Search in Google Scholar
Zhang, S., Wang, Z., Yang, J., Cheng, X., Ma, X. Q., & Zhang, H., et al. (2021). Minehunter: a practical cryptomining traffic detection algorithm based on time series tracking. Annual Computer Security Applications Conference.Search in Google Scholar
Hossain, S. B., Rahman, T., Stojanovic, N., Rosales, R., & Pachnicke, S. (2021). Transmission beyond 200 gbit/s with im/dd system for campus and intra-datacenter network applications. IEEE Photonics Technology Letters, PP(99), 1–1.Search in Google Scholar
Wang, Z. J., Mao, S., & Yang, W. (2019). A deep learning approach to multimedia traffic classification based on qos characteristics. IET Networks, 8(3), 145–154.Search in Google Scholar
Kashif, S., Hazrat, A., & Zhongshan, Z. (2018). Call detail records driven anomaly detection and traffic prediction in mobile cellular networks. IEEE Access, 1–1.Search in Google Scholar