Results 241 to 250 of about 25,989,787 (296)
Some of the next articles are maybe not open access.
arXiv.org
Machine learning (ML) powered network traffic analysis has been widely used for the purpose of threat detection. Unfortunately, their generalization across different tasks and unseen data is very limited.
Tianyu Cui +6 more
semanticscholar +1 more source
Machine learning (ML) powered network traffic analysis has been widely used for the purpose of threat detection. Unfortunately, their generalization across different tasks and unseen data is very limited.
Tianyu Cui +6 more
semanticscholar +1 more source
Critical traffic analysis on the tor network
ARES, 2020Tor is a widely-used anonymity network with more than two million daily users. A special feature of Tor is the hidden service architecture. Hidden services are a popular method for anonymous communication or sharing web contents anonymously.
Florian Platzer +2 more
semanticscholar +1 more source
Symposium on Networked Systems Design and Implementation
The emerging programmable networks sparked significant research on Intelligent Network Data Plane (INDP), which achieves learning-based traffic analysis at line-speed. Prior art in INDP focus on deploying tree/forest models on the data plane.
Jinzhu Yan +6 more
semanticscholar +1 more source
The emerging programmable networks sparked significant research on Intelligent Network Data Plane (INDP), which achieves learning-based traffic analysis at line-speed. Prior art in INDP focus on deploying tree/forest models on the data plane.
Jinzhu Yan +6 more
semanticscholar +1 more source
FastFE: Accelerating ML-based Traffic Analysis with Programmable Switches
SPIN@SIGCOMM, 2020Modern traffic analysis applications are usually designed to identify malicious behaviors by inferring sensitive information with machine learning (ML) techniques from network traffic, and they are of great importance to security with the growing use of ...
Jia-Ju Bai +5 more
semanticscholar +1 more source
IEEE Communications Surveys and Tutorials, 2019
Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling.
Stephan Kleber, Lisa Maile, Frank Kargl
semanticscholar +1 more source
Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling.
Stephan Kleber, Lisa Maile, Frank Kargl
semanticscholar +1 more source
Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing
2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019Traffic analysis attacks allow an attacker to infer sensitive information about users by analyzing network traffic of user devices. These attacks are passive in nature and are difficult to detect.
I. Hafeez, M. Antikainen, Sasu Tarkoma
semanticscholar +1 more source
Traffic Analysis and Solutions
2013Urban mobility offers a unique opportunity to ensure development and radical improvement to the quality of urban life in the Multan City center. The traditional approach to transport planning usually aims only at solving technical issues, finding the solutions within its own discipline.
Donato V., Camolese S., Terenzi A.
openaire +1 more source
2006 2nd International Conference on Information & Communication Technologies, 2006
This paper presents the results of a detailed analysis of the traffic flows in operation between the two sites of a ViCCU® telehealth system. The traffic characteristics for each direction were measured separately. The captured data are treated with sampled rate analysis and detailed instantaneous packet rate analysis. Specifically, the results provide
null Ren Ping Liu +2 more
openaire +1 more source
This paper presents the results of a detailed analysis of the traffic flows in operation between the two sites of a ViCCU® telehealth system. The traffic characteristics for each direction were measured separately. The captured data are treated with sampled rate analysis and detailed instantaneous packet rate analysis. Specifically, the results provide
null Ren Ping Liu +2 more
openaire +1 more source
Proceedings of the 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2005
Online gaming is one of the most profitable businesses over the Internet. Among all genres of the online games, the popularity of the MMORPG (Massive Multiplayer Online Role Playing Games) is especially prominent in Asia. Opting for a better understanding of the game traffic and the economic well being of the Internet, we analyze a 1,356-million-packet
Kuan-Ta Chen +3 more
openaire +1 more source
Online gaming is one of the most profitable businesses over the Internet. Among all genres of the online games, the popularity of the MMORPG (Massive Multiplayer Online Role Playing Games) is especially prominent in Asia. Opting for a better understanding of the game traffic and the economic well being of the Internet, we analyze a 1,356-million-packet
Kuan-Ta Chen +3 more
openaire +1 more source
Detecting Drones Status via Encrypted Traffic Analysis
WiseML@WiSec, 2019We propose a methodology to detect the current status of a powered-on drone (flying or at rest), leveraging just the communication traffic exchanged between the drone and its Remote Controller (RC).
Savio Sciancalepore +3 more
semanticscholar +1 more source

