Showing
1 - 5
results of
5
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Lichy, Adi
Search Results - Lichy, Adi
Showing
1 - 5
results of
5
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification
by
Lichy, Adi
,
Bader, Ofek
,
Dubin, Ran
,
Dvir, Amit
,
Hajaj, Chen
Published in
Computers & security
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification
by
Bader, Ofek
,
Lichy, Adi
,
Dvir, Amit
,
Dubin, Ran
,
Hajaj, Chen
Published in
Computer communications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification
by
Bader, Ofek
,
Lichy, Adi
,
Hajaj, Chen
,
Dubin, Ran
,
Dvir, Amit
Request full text
Conference Proceeding
Save to List
Saved in:
4
Loading…
Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
by
Ofek Bader
,
Lichy, Adi
,
Dvir, Amit
,
Dubin, Ran
,
Chen Hajaj
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
5
Loading…
When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
by
Lichy, Adi
,
Ofek Bader
,
Dubin, Ran
,
Dvir, Amit
,
Chen Hajaj
Published in
arXiv.org
Get full text
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
2 results
2
Full Text
5 results
5
Format
Articles
4 results
4
Conference Proceedings
1 results
1
Journal Title
Computer Communications
1 results
1
Computers & Security
1 results
1
Subjects
Machine Learning
5 results
5
Deep Learning
4 results
4
Classification
3 results
3
Quality Of Service Architectures
3 results
3
Computer Science
2 results
2
Computer Science, Information Systems
2 results
2
Datasets
2 results
2
Encryption
2 results
2
Malware
2 results
2
Science & Technology
2 results
2
Technology
2 results
2
Traffic Models
2 results
2
Community Participation
1 results
1
Computer Security
1 results
1
Cybersecurity
1 results
1
Empirical Analysis
1 results
1
Encrypted Traffic
1 results
1
Encrypted Traffic Classification
1 results
1
Engineering
1 results
1
Engineering, Electrical & Electronic
1 results
1
Year of Publication
From:
To:
Source
Sciencedirect
2 results
2
World Web Journals
2 results
2
Sciencedirect Freedom Collection
2 results
2
Road: Directory Of Open Access Scholarly Resources
2 results
2
Publicly Available Content Database
2 results
2
Backfile Package - Computer Science (Legacy) [Ycs]
2 results
2
Ieee Electronic Library (Iel) Conference Proceedings
1 results
1
Ieee Xplore All Conference Series
1 results
1
Elsevier Business, Management And Accounting Archive
1 results
1
Backfile Package - Business, Management And Accounting (Legacy) [Ybt]
1 results
1