Smartphone app usage analysis: datasets, methods, and applications
As smartphones have become indispensable personal devices, the number of smartphone
users has increased dramatically over the last decade. These personal devices, which are …
users has increased dramatically over the last decade. These personal devices, which are …
Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification
Encrypted traffic classification requires discriminative and robust traffic representation
captured from content-invisible and imbalanced traffic data for accurate classification, which …
captured from content-invisible and imbalanced traffic data for accurate classification, which …
A survey on encrypted network traffic analysis applications, techniques, and countermeasures
E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
Deep learning for encrypted traffic classification: An overview
Traffic classification has been studied for two decades and applied to a wide range of
applications from QoS provisioning and billing in ISPs to security-related applications in …
applications from QoS provisioning and billing in ISPs to security-related applications in …
Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges
The massive adoption of hand-held devices has led to the explosion of mobile traffic
volumes traversing home and enterprise networks, as well as the Internet. Traffic …
volumes traversing home and enterprise networks, as well as the Internet. Traffic …
A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Fs-net: A flow sequence network for encrypted traffic classification
C Liu, L He, G Xiong, Z Cao, Z Li - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
With more attention paid to user privacy and communication security, the volume of
encrypted traffic rises sharply, which brings a huge challenge to traditional rule-based traffic …
encrypted traffic rises sharply, which brings a huge challenge to traditional rule-based traffic …
When machine learning meets privacy in 6G: A survey
The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …
MIMETIC: Mobile encrypted traffic classification using multimodal deep learning
Abstract Mobile Traffic Classification (TC) has become nowadays the enabler for valuable
profiling information, other than being the workhorse for service differentiation or blocking …
profiling information, other than being the workhorse for service differentiation or blocking …