4.5 Article

α-MON: Traffic Anonymizer for Passive Monitoring

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Five Years at the Edge: Watching Internet From the ISP Network

Martino Trevisan et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2020)

Article Computer Science, Information Systems

A Survey on Big Data for Network Traffic Monitoring and Analysis

Alessandro D'Alconzo et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Proceedings Paper Computer Science, Artificial Intelligence

ONTAS: Flexible and Scalable Online Network Traffic Anonymization System

Hyojoon Kim et al.

NETAI'19: PROCEEDINGS OF THE 2019 ACM SIGCOMM WORKSHOP ON NETWORK MEETS AI & ML (2019)

Article Engineering, Electrical & Electronic

Traffic Analysis with Off-the-Shelf Hardware: Challenges and Lessons Learned

Martino Trevisan et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Users' Fingerprinting Techniques from TCP Traffic

Luca Vassio et al.

BIG-DAMA '17: PROCEEDINGS OF THE 2017 WORKSHOP ON BIG DATA ANALYTICS AND MACHINE LEARNING FOR DATA COMMUNICATION NETWORKS (2017)

Article Computer Science, Information Systems

SeLINA: A Self-Learning Insightful Network Analyzer

Daniele Apiletti et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Computer Science, Information Systems

SeLINA: A Self-Learning Insightful Network Analyzer

Daniele Apiletti et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Computer Science, Information Systems

A survey of methods for encrypted traffic classification and analysis

Petr Velan et al.

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2015)

Article Computer Science, Hardware & Architecture

Experiences of Internet Traffic Monitoring with Tstat

Alessandro Finamore et al.

IEEE NETWORK (2011)

Article Computer Science, Hardware & Architecture

CASTLE: Continuously Anonymizing Data Streams

Jianneng Cao et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)