A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Measuring the performance and network utilization of popular video conferencing applications
Video conferencing applications (VCAs) have become a critical Internet application during
the COVID-19 pandemic, as users worldwide now rely on them for work, school, and …
the COVID-19 pandemic, as users worldwide now rely on them for work, school, and …
Skypemorph: Protocol obfuscation for tor bridges
The Tor network is designed to provide users with low-latency anonymous communications.
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …
The parrot is dead: Observing unobservable network communications
A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …
censors in non-democratic countries have increased their technical capabilities and can …
Video telephony for end-consumers: Measurement study of Google+, iChat, and Skype
Video telephony requires high-bandwidth and low-delay voice and video transmissions
between geographically distributed users. It is challenging to deliver high-quality video …
between geographically distributed users. It is challenging to deliver high-quality video …
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
Identifying encrypted application traffic represents an important issue for many network tasks
including quality of service, firewall enforcement and security. Solutions should ideally be …
including quality of service, firewall enforcement and security. Solutions should ideally be …
Detailed analysis of skype traffic
Skype is beyond any doubt the VoIP application in the current Internet application spectrum.
Its amazing success has drawn the attention of telecom operators and the research …
Its amazing success has drawn the attention of telecom operators and the research …
Profiling skype video calls: Rate control and video quality
Video telephony has recently gained its momentum and is widely adopted by end-
consumers. But there have been very few studies on the network impacts of video calls and …
consumers. But there have been very few studies on the network impacts of video calls and …
Per-frame energy consumption in 802.11 devices and its implication on modeling and design
This paper provides an in-depth understanding of the per-frame energy consumption
behavior in 802.11 wireless LAN devices. Extensive measurements are performed for seven …
behavior in 802.11 wireless LAN devices. Extensive measurements are performed for seven …
A comparative study of RTC applications
Real-Time Communication (RTC) applications have become ubiquitous and are nowadays
fundamental for people to communicate with friends and relatives, as well as for enterprises …
fundamental for people to communicate with friends and relatives, as well as for enterprises …