[HTML][HTML] Accurate encrypted malicious traffic identification via traffic interaction pattern using graph convolutional network
G Ren, G Cheng, N Fu - Applied Sciences, 2023 - mdpi.com
Featured Application The results of this paper can be used in the related fields of encrypted
malicious traffic analysis, especially in identifying different attacks based on the graph …
malicious traffic analysis, especially in identifying different attacks based on the graph …
Algorithm design and analysis for wireless relay network deployment problem
Wireless relay network has been widely used in many applications to improve the wireless
service. In this paper, we aim to maximize users' satisfaction by deploying limited number of …
service. In this paper, we aim to maximize users' satisfaction by deploying limited number of …
[PDF][PDF] The dynamic relay placement problem: Completing mesh networks of moving sensors
P Voors - 2022 - pure.tue.nl
In the relay placement problem, given a set of static sensors and relay range r≥ 1, we must
place a minimum number of static relays such that any two sensors can communicate via the …
place a minimum number of static relays such that any two sensors can communicate via the …