Towards the deployment of machine learning solutions in network traffic classification: A systematic survey

F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …

Cyber reconnaissance techniques

W Mazurczyk, L Caviglione - Communications of the ACM, 2021 - dl.acm.org
Cyber reconnaissance techniques Page 1 86 COMMUNICATIONS OF THE ACM | MARCH 2021
| VOL. 64 | NO. 3 review articles IMA GE B Y DE S TROL O VE ALMOST EVERY DAY, security …

A hybrid approach for personalized recommendation of news on the Web

H Wen, L Fang, L Guan - Expert Systems with Applications, 2012 - Elsevier
A hybrid method for personalized recommendation of news on the Web is presented, which
provides Web users with an autonomous tool that is able to minimize repetitive and tedious …

A framework to classify heterogeneous Internet traffic with Machine Learning and Deep Learning techniques for satellite communications

F Pacheco, E Exposito, M Gineste - Computer Networks, 2020 - Elsevier
Nowadays, the Internet network system serves as a platform for communication, transaction,
and entertainment, among others. This communication system is characterized by terrestrial …

Measuring and classifying IP usage scenarios: a continuous neural trees approach

Z Li, F Zhou, Z Wang, X Xu, L Liu, G Yin - Scientific Reports, 2024 - nature.com
Understanding user behavior via IP addresses is a crucial measure towards numerous
pragmatic IP-based applications, including online content delivery, fraud prevention …

A multilevel taxonomy and requirements for an optimal traffic‐classification model

J Khalife, A Hajjar… - International Journal of …, 2014 - Wiley Online Library
Identifying Internet traffic applications is essential for network security and management. The
steady emergence of new Internet applications, together with the use of encryption and …

Mosaic: Quantifying privacy leakage in mobile networks

N Xia, HH Song, Y Liao, M Iliofotou, A Nucci… - Proceedings of the …, 2013 - dl.acm.org
With the proliferation of online social networking (OSN) and mobile devices, preserving user
privacy has become a great challenge. While prior studies have directly focused on OSN …

Select: Self-learning classifier for internet traffic

L Grimaudo, M Mellia, E Baralis… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Network visibility is a critical part of traffic engineering, network management, and security.
The most popular current solutions-Deep Packet Inspection (DPI) and statistical …

[PDF][PDF] Breaking and improving protocol obfuscation

E Hjelmvik, W John - Chalmers University of Technology, Tech. Rep, 2010 - iis.se
Different techniques for traffic classification are utilized in various fields of application. In this
technical report, we look closer on how statistical analysis can be used to identify network …

A taxonomy-based model of security and privacy in online social networks

L Caviglione, M Coccoli… - International Journal of …, 2014 - inderscienceonline.com
Social environments were already present in the original web vision, but nowadays are
mainly available through online social networks (OSNs), which are a real cultural …