Exploring Temporal GNN Embeddings for Darknet Traffic Analysis

L Gioacchini, A Cavallo, M Mellia, L Vassio - … of the 2nd on Graph Neural …, 2023 - dl.acm.org
Network Traffic Analysis (NTA) serves as a foundational tool for characterizing network
entities and uncovering suspicious traffic patterns, thereby enhancing our understanding of …

Cross-network Embeddings Transfer for Traffic Analysis

L Gioacchini, M Mellia, L Vassio, I Drago… - … on Network and …, 2023 - ieeexplore.ieee.org
Artificial Intelligence (AI) approaches have emerged as powerful tools to improve traffic
analysis for network monitoring and management. However, the lack of large labeled …

Detecting Edge and Node Anomalies with Temporal GNNs

A Cavallo, L Gioacchini, L Vassio, M Mellia - Proceedings of the 3rd …, 2024 - dl.acm.org
Computer and social networks can be effectively represented as complex temporal graphs
where entities (nodes) keep interconnecting through various relationships (edges), forming …

Disentangling the Information Flood on OSNs: Finding Notable Posts and Topics

P Caso, M Trevisan, L Vassio - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Online Social Networks (OSN s) are an integral part of modern life for sharing thoughts,
stories, and news. An ecosystem of influencers generates a flood of content in the form of …

Identification and Clustering of Anomalies on Online Social Networks

P Caso - 2022 - webthesis.biblio.polito.it
Abstract Online Social Networks (OSNs) have become an integral part of modern-day life.
People use Social Media platforms to share their thoughts, stories, and news, and major …

SCION architecture–A study

Μ Σουβαλιώτη - 2024 - polynoe.lib.uniwa.gr
This thesis deals with the new network architecture based on the secure transfer of
information that is developed in Europe, SCION Architecture. SCION architecture is aiming …

[PDF][PDF] An AI and data-driven approach to unwanted network traffic inspection

F Soro - 2022 - tesidottorato.depositolegale.it
The growing number of connected devices on the Internet makes the end users more and
more vulnerable to cyberattacks. Malicious entities in the network are constantly fostering …