Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
A survey on encrypted network traffic analysis applications, techniques, and countermeasures
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
Deep packet: A novel approach for encrypted traffic classification using deep learning
Network traffic classification has become more important with the rapid growth of Internet
and online applications. Numerous studies have been done on this topic which have led to …
and online applications. Numerous studies have been done on this topic which have led to …
End-to-end encrypted traffic classification with one-dimensional convolution neural networks
W Wang, M Zhu, J Wang, X Zeng… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Traffic classification plays an important and basic role in network management and
cyberspace security. With the widespread use of encryption techniques in network …
cyberspace security. With the widespread use of encryption techniques in network …
Fs-net: A flow sequence network for encrypted traffic classification
C Liu, L He, G **ong, Z Cao, Z Li - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
With more attention paid to user privacy and communication security, the volume of
encrypted traffic rises sharply, which brings a huge challenge to traditional rule-based traffic …
encrypted traffic rises sharply, which brings a huge challenge to traditional rule-based traffic …
The rise of traffic classification in IoT networks: A survey
With the proliferation of the Internet of Things (IoT), the integration and communication of
various objects have become a prevalent practice. The huge growth of IoT devices and …
various objects have become a prevalent practice. The huge growth of IoT devices and …
Towards the deployment of machine learning solutions in network traffic classification: A systematic survey
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …
Peek-a-boo: I see your smart home activities, even encrypted!
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …
allow users to easily control the physical world around them and facilitate their living styles …
FlowPic: A generic representation for encrypted traffic classification and applications identification
Identifying the type of a network flow or a specific application has many advantages, such
as, traffic engineering, or to detect and prevent application or application types that violate …
as, traffic engineering, or to detect and prevent application or application types that violate …