A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

[PDF][PDF] Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study

I Rouf, R Miller, H Mustafa, T Taylor, S Oh… - 19th USENIX Security …, 2010 - usenix.org
Wireless networks are being integrated into the modern automobile. The security and
privacy implications of such in-car networks, however, have are not well understood as their …

How talkative is your mobile device? An experimental study of Wi-Fi probe requests

J Freudiger - Proceedings of the 8th ACM conference on security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …

Estimating crowd densities and pedestrian flows using wi-fi and bluetooth

L Schauer, M Werner, P Marcus - Proceedings of the 11th International …, 2014 - dl.acm.org
The rapid deployment of smartphones as all-purpose mobile computing systems has led to a
wide adoption of wireless communication systems such as Wi-Fi and Bluetooth in mobile …

Secure friend discovery in mobile social networks

W Dong, V Dave, L Qiu, Y Zhang - 2011 proceedings ieee …, 2011 - ieeexplore.ieee.org
Mobile social networks extend social networks in the cyberspace into the real world by
allowing mobile users to discover and interact with existing and potential friends who …

A blockchain-based mutual authentication method to secure the electric vehicles' TPMS

P Razmjoui, A Kavousi-Fard, T **… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Despite the widespread use of radio frequency identification and wireless connectivity such
as near field communication in electric vehicles, their security and privacy implications in Ad …

On the optimal placement of mix zones

J Freudiger, R Shokri, JP Hubaux - International Symposium on Privacy …, 2009 - Springer
In mobile wireless networks, third parties can track the location of mobile nodes by
monitoring the pseudonyms used for identification. A frequently proposed solution to protect …

Protecting privacy of {BLE} device users

K Fawaz, KH Kim, KG Shin - 25th USENIX Security Symposium (USENIX …, 2016 - usenix.org
Bluetooth Low Energy (BLE) has emerged as an attractive technology to enable Internet of
Things (IoTs) to interact with others in their vicinity. Our study of the behavior of more than …

On non-cooperative location privacy: a game-theoretic analysis

J Freudiger, MH Manshaei, JP Hubaux… - Proceedings of the 16th …, 2009 - dl.acm.org
In mobile networks, authentication is a required primitive for the majority of security
protocols. However, an adversary can track the location of mobile nodes by monitoring …