ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2009.01122
  4. Cited By
Flow-based detection and proxy-based evasion of encrypted malware C2
  traffic

Flow-based detection and proxy-based evasion of encrypted malware C2 traffic

2 September 2020
Carlos Novo
Ricardo Morla
    AAML
ArXivPDFHTML

Papers citing "Flow-based detection and proxy-based evasion of encrypted malware C2 traffic"

5 / 5 papers shown
Title
Flow-based Network Traffic Generation using Generative Adversarial
  Networks
Flow-based Network Traffic Generation using Generative Adversarial Networks
Markus Ring
Daniel Schlor
Dieter Landes
Andreas Hotho
53
171
0
27 Sep 2018
IDSGAN: Generative Adversarial Networks for Attack Generation against
  Intrusion Detection
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
Zilong Lin
Yong-yu Shi
Zhi Xue
AAML
54
265
0
06 Sep 2018
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library
Nicolas Papernot
Fartash Faghri
Nicholas Carlini
Ian Goodfellow
Reuben Feinman
...
David Berthelot
P. Hendricks
Jonas Rauber
Rujun Long
Patrick McDaniel
AAML
65
512
0
03 Oct 2016
Deciphering Malware's use of TLS (without Decryption)
Deciphering Malware's use of TLS (without Decryption)
Blake Anderson
S. Paul
D. McGrew
42
178
0
06 Jul 2016
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
274
19,049
0
20 Dec 2014
1