Results 231 to 240 of about 25,989,787 (296)
Some of the next articles are maybe not open access.
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey
IEEE Communications Surveys and Tutorials, 2023Traffic analysis is the process of monitoring network activities, discovering specific patterns, and gleaning valuable information from network traffic. It can be applied in various fields such as network assert probing and anomaly detection.
Meng Shen +7 more
semanticscholar +1 more source
Botnet‐based IoT network traffic analysis using deep learning
Security and Privacy, 2023IoT networks are increasingly being connected to a wide range of devices, and the number of devices connected has significantly increased in recent years.
Nongthombam Joychandra Singh +3 more
semanticscholar +1 more source
Vehicle communication and Traffic analysis using LoRa Technology
2023 Global Conference on Information Technologies and Communications (GCITC), 2023Hal Varian predicts that in the coming decades, "the ability to take data—tobe able to understand it, to analyse it, to extract value from it, to visualise it, to convey it—is going to be an enormously significant skill." This paper presents a novel ...
Santhosh B +4 more
semanticscholar +1 more source
A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures
ACM Computing Surveys, 2021The adoption of network traffic encryption is continually growing. Popular applications use encryption protocols to secure communications and protect the privacy of users.
Eva Papadogiannaki, S. Ioannidis
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2021
Decentralized Applications (DApps) are increasingly developed and deployed on blockchain platforms such as Ethereum. DApp fingerprinting can identify users’ visits to specific DApps by analyzing the resulting network traffic, revealing much sensitive ...
Meng Shen +4 more
semanticscholar +1 more source
Decentralized Applications (DApps) are increasingly developed and deployed on blockchain platforms such as Ethereum. DApp fingerprinting can identify users’ visits to specific DApps by analyzing the resulting network traffic, revealing much sensitive ...
Meng Shen +4 more
semanticscholar +1 more source
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection
Conference on Computer and Communications Security, 2022Tor~\citetor is the most widely used anonymous communication network with millions of daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of malware binaries found in the wild rely on it to hide their presence and hinder
Priyanka Dodia +3 more
semanticscholar +1 more source
Data-Driven Cyber Security in Perspective—Intelligent Traffic Analysis
IEEE Transactions on Cybernetics, 2020Social and Internet traffic analysis is fundamental in detecting and defending cyber attacks. Traditional approaches resorting to manually defined rules are gradually replaced by automated approaches empowered by machine learning.
R. Coulter +4 more
semanticscholar +1 more source
Traffic Analysis Attacks on Tor: A Survey
International Conference on Informatics, IoT, and Enabling Technologies, 2020The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic analysis is a very strong tool
Lamiaa Basyoni +4 more
semanticscholar +1 more source
SDN-based real-time urban traffic analysis in VANET environment
Computer Communications, 2020Accurate and real-time traffic flow prediction plays a central role for efficient traffic management. Software Defined Networking (SDN) is one of the key concerns in networking that has caught much attention in recent years.
Jitendra Bhatia +4 more
semanticscholar +1 more source

