4.7 Article

An early stage convolutional feature extracting method using for mining traffic detection

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning

Rupesh Raj Karn et al.

Summary: The article discusses the increasing use of containers in cloud computing, simplified application management with Kubernetes, and the emerging security threat of cryptomining. It proposes using machine learning to detect malicious cryptomining software in Kubernetes pods and support management decisions with explainability tools.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Information Systems

Cryptomining makes noise: Detecting cryptojacking via Machine Learning

Maurantonio Caprolu et al.

Summary: Cryptojacking is a novel cybersecurity attack where crypto-mining software is illicitly run on unaware users' devices. Proposed countermeasures typically have a host-based architecture and may not be effective for protecting corporate networks, especially against insiders. This study introduces a network-based approach to detect and identify crypto-clients activities by solely relying on network traffic analysis.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning

Antonio Pastor et al.

IEEE ACCESS (2020)

Article Environmental Studies

Cryptodamages: Monetary value estimates of the air pollution and human health impacts of cryptocurrency mining

Andrew L. Goodkind et al.

ENERGY RESEARCH & SOCIAL SCIENCE (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

Mind Your Wallet's Privacy: Identifying Bitcoin Wallet Apps and User's Actions through Network Traffic Analysis

Fabio Aiolli et al.

SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING (2019)

Article Computer Science, Artificial Intelligence

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

Amin Azmoodeh et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2018)

Article Criminology & Penology

Use of Bitcoin in Darknet Markets: Examining Facilitative Factors on Bitcoin-Related Crimes

Sesha Kethineni et al.

AMERICAN JOURNAL OF CRIMINAL JUSTICE (2018)

Review Computer Science, Artificial Intelligence

Deep Convolutional Neural Networks for Image Classification: A Comprehensive Review

Waseem Rawat et al.

NEURAL COMPUTATION (2017)

Article Computer Science, Theory & Methods

Effectiveness of Statistical Features for Early Stage Internet Traffic Identification

Lizhi Peng et al.

INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING (2016)

Article Computer Science, Information Systems

Difficulty control for blockchain-based consensus systems

Daniel Kraft

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Effective packet number for early stage internet traffic identification

Lizhi Peng et al.

NEUROCOMPUTING (2015)

Article Computer Science, Information Systems

Use of K-Nearest Neighbor classifier for intrusion detection

YH Liao et al.

COMPUTERS & SECURITY (2002)