A survey of blockchain: Techniques, applications, and challenges
Blockchain, as a mechanism to decentralize services, security, and verifiability, offers a peer-
to-peer system in which distributed nodes collaboratively affirm transaction provenance. In …
to-peer system in which distributed nodes collaboratively affirm transaction provenance. In …
Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …
Although there are notable efforts to classify darknet traffic which rely heavily on existing …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …
An automatic and efficient malware traffic classification method for secure Internet of Things
Malware traffic classification (MTC) plays an important role in cyber security and network
resource management for the secure Internet of Things (IoT). Many deep learning (DL) …
resource management for the secure Internet of Things (IoT). Many deep learning (DL) …
Torank: Identifying the most influential suspicious domains in the tor network
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection
Tor~\citetor is the most widely used anonymous communication network with millions of
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …
Machine learning approach for detection of nontor traffic
Intrusion detection has attracted a considerable interest from researchers and industries.
After many years of research the community still faces the problem of building reliable and …
After many years of research the community still faces the problem of building reliable and …
Efficient fine-grained website fingerprinting via encrypted traffic analysis with deep learning
Fine-grained website fingerprinting (WF) enables potential attackers to infer individual
webpages on a monitored website that victims are visiting, by analyzing the resulting traffic …
webpages on a monitored website that victims are visiting, by analyzing the resulting traffic …
Black-box adversarial machine learning attack on network traffic classification
Deep machine learning techniques have shown promising results in network traffic
classification, however, the robustness of these techniques under adversarial threats is still …
classification, however, the robustness of these techniques under adversarial threats is still …
Deep neural classification of darknet traffic
Darknet is an encrypted portion of the internet for users who intend to hide their identity.
Darknet's anonymous nature makes it an effective tool for illegal online activities such as …
Darknet's anonymous nature makes it an effective tool for illegal online activities such as …