[HTML][HTML] Accurate encrypted malicious traffic identification via traffic interaction pattern using graph convolutional network

G Ren, G Cheng, N Fu - Applied Sciences, 2023 - mdpi.com
Featured Application The results of this paper can be used in the related fields of encrypted
malicious traffic analysis, especially in identifying different attacks based on the graph …

Algorithm design and analysis for wireless relay network deployment problem

X Gao, J Lu, H Wang, F Wu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Wireless relay network has been widely used in many applications to improve the wireless
service. In this paper, we aim to maximize users' satisfaction by deploying limited number of …

[PDF][PDF] The dynamic relay placement problem: Completing mesh networks of moving sensors

P Voors - 2022 - pure.tue.nl
In the relay placement problem, given a set of static sensors and relay range r≥ 1, we must
place a minimum number of static relays such that any two sensors can communicate via the …