Identifying VPN Servers through Graph-Represented Behaviors

C Wang, J Yin, Z Li, H Xu, Z Zhang, Q Liu - Proceedings of the ACM Web …, 2024‏ - dl.acm.org
Identifying VPN servers is a crucial task in various situations, such as geo-fraud detection,
bot traffic analysis and network attack identification. Although numerous studies that focus …

Characterizing User Platforms for Video Streaming in Broadband Networks

Y Wang, M Lyu, V Sivaraman - Proceedings of the 2024 ACM on Internet …, 2024‏ - dl.acm.org
Internet Service Providers (ISPs) bear the brunt of being the first port of call for poor video
streaming experience. ISPs can benefit from knowing the user's device type (eg, Android …

Evaluation of passive OS fingerprinting methods using TCP/IP fields

M Hulák, V Bartoš, T Čejka - 2023 8th International Conference …, 2023‏ - ieeexplore.ieee.org
An important part of network management is to keep knowledge about the connected
devices. One of the tools that can provide such information in real-time is passive OS …

A survey of transmission control protocol variants

LM Machora - World Journal of Advanced Research and Reviews, 2024‏ - wjarr.co.in
TCP (Transmission Control Protocol), is a reliable connection oriented end-to-end protocol.
It contains within itself, mechanisms for ensuring reliability by requiring the receiver to …

Exploring optimizer efficiency for facial expression recognition with convolutional neural networks

SHH Madni, LA/L Pathmanatan… - The Journal of …, 2025‏ - Wiley Online Library
It's widely accepted that human expressions, considering for roughly sixty percent of all daily
interactions, are among the most authentic forms of communication. Numerous studies are …

Operating system fingerprinting tool based on classical machine learning algorithms

R Pérez-Jove, CR Munteanu, J Dorado… - 2023 JNIC …, 2023‏ - ieeexplore.ieee.org
Operating System (OS) fingerprinting aims to identify the OS of a machine analysing its
network traffic. Traditional OS fingerprinting tools use a rule-based approach to perform this …

[PDF][PDF] TCP/IP stack transport layer performance, privacy, and security issues

OO Felix - World Journal of Advanced Engineering Technology …, 2024‏ - researchgate.net
Abstract Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of Internet
transmission. The Transport Layer of the TCP/IP stack, which includes TCP (Transmission …

Application of Tabular Transformer Architectures for Operating System Fingerprinting

R Pérez-Jove, CR Munteanu, A Pazos… - arxiv preprint arxiv …, 2025‏ - arxiv.org
Operating System (OS) fingerprinting is essential for network management and
cybersecurity, enabling accurate device identification based on network traffic analysis …

Dynamic adaptation of scan rates for efficient and congestion-aware internet-wide scanning in IoT security

A Velayudham, MSK Priya - Evolving Systems, 2025‏ - Springer
Nowadays, internet-wide scanning is considered as a countermeasure against the security
problems in internet-of-things (IoT). The network congestion problem severely affects the IoT …

Clid: Identifying TLS Clients With Unsupervised Learning on Domain Names

I Nam, G Wan - arxiv preprint arxiv:2410.02040, 2024‏ - arxiv.org
In this paper, we introduce Clid, a Transport Layer Security (TLS) client identification tool
based on unsupervised learning on domain names in the server name indication (SNI) field …