A survey on network security-related data collection technologies

H Lin, Z Yan, Y Chen, L Zhang - IEEe Access, 2018 - ieeexplore.ieee.org
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities
have motivated intensive studies on network security. Normally, data collected in a network …

[HTML][HTML] Adaptive security-related data collection with context awareness

H Lin, Z Yan, Y Fu - Journal of Network and Computer Applications, 2019 - Elsevier
The huge economic loss resulting from network attacks and intrusions has led to an
intensive study on network security. The network security is usually reflected by some …

Consumption behavior analysis of over the top services: Incremental learning or traditional methods?

JS Rojas, A Rendon, JC Corrales - IEEE Access, 2019 - ieeexplore.ieee.org
Network monitoring and analysis of consumption behavior are important aspects for network
operators. The information obtained about consumption trends allows to offer new data …

Forensic content detection through power consumption

U Greveler, B Justus, D Loehr - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Digital forensic investigators are facing challenging problems of finding clues and solving
crimes involving digital data. Advanced metering devices (smart meters) are being installed …

Specwatch: Adversarial spectrum usage monitoring in crns with unknown statistics

M Li, D Yang, J Lin, J Tang - IEEE INFOCOM 2016-The 35th …, 2016 - ieeexplore.ieee.org
In cognitive radio networks (CRNs), dynamic spectrum access has been proposed to
improve the spectrum utilization, but it also generates spectrum misuse problems. One …

SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics

M Li, D Yang, J Lin, J Tang - Computer Networks, 2018 - Elsevier
In cognitive radio networks (CRNs), dynamic spectrum access has been proposed to
improve the spectrum utilization, but it also generates spectrum misuse problems. One …

Redundant sniffer deployment for multi-channel wireless network forensics with unreliable conditions

J Xu, S Gong, Y Zou, W Liu, K Zeng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Network forensics refers to monitoring and analysis of network traffic for the purpose of
information gathering, legal evidence, or intrusion detection. Wireless sniffers are usually …

Learning optimal sniffer channel assignment for small cell cognitive radio networks

L Chen, Z Lu, P Zhou, J Xu - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
To cope with the exploding mobile traffic in the fifth generation cellular network, the dense
deployment of small cells and cognitive radios are two key technologies that significantly …

Sentiment-analysis of review text for micro-video

Z Liu, N Yang, S Cao - 2016 2nd IEEE International Conference …, 2016 - ieeexplore.ieee.org
With the rapid development of big data technology, the application of online micro video has
been improved greatly. This paper provides a method of analyzing the sentiment of the …

Sniffer channel assignment with imperfect monitoring for cognitive radio networks

J Xu, Q Wang, K Zeng, M Liu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Sniffer channel assignment (SCA) is a fundamental building block for wireless data capture,
which is essential for traffic monitoring and network forensics. Most of the existing SCA …