Picture for Amit Dvir

Amit Dvir

Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques

Add code
Jul 23, 2024
Viaarxiv icon

CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

Add code
Mar 17, 2024
Figure 1 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 2 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 3 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Figure 4 for CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Viaarxiv icon

Open Image Content Disarm And Reconstruction

Add code
Jul 26, 2023
Viaarxiv icon

Open-Source Framework for Encrypted Internet and Malicious Traffic Classification

Add code
Jun 21, 2022
Figure 1 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 2 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 3 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Figure 4 for Open-Source Framework for Encrypted Internet and Malicious Traffic Classification
Viaarxiv icon

When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Add code
Jun 16, 2022
Figure 1 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 2 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 3 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Figure 4 for When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Viaarxiv icon

MaMaDroid2.0 -- The Holes of Control Flow Graphs

Add code
Feb 28, 2022
Figure 1 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 2 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 3 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Figure 4 for MaMaDroid2.0 -- The Holes of Control Flow Graphs
Viaarxiv icon

I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification

Add code
Jul 21, 2016
Figure 1 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Figure 2 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Figure 3 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Figure 4 for I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification
Viaarxiv icon

Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari

Add code
Feb 19, 2016
Figure 1 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Figure 2 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Figure 3 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Figure 4 for Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari
Viaarxiv icon