[HTML][HTML] Green internet of things using UAVs in B5G networks: A review of applications and strategies

SH Alsamhi, F Afghah, R Sahal, A Hawbani… - Ad Hoc Networks, 2021 - Elsevier
Abstract Recently, Unmanned Aerial Vehicles (UAVs) present a promising advanced
technology that can enhance people life quality and smartness of cities dramatically and …

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

R Boutaba, MA Salahuddin, N Limam, S Ayoubi… - Journal of Internet …, 2018 - Springer
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …

Unsupervised machine learning for networking: Techniques, applications and research challenges

M Usama, J Qadir, A Raza, H Arif, KLA Yau… - IEEE …, 2019 - ieeexplore.ieee.org
While machine learning and artificial intelligence have long been applied in networking
research, the bulk of such works has focused on supervised learning. Recently, there has …

[PDF][PDF] Characterization of encrypted and vpn traffic using time-related

G Draper-Gil, AH Lashkari, MSI Mamun… - Proceedings of the …, 2016 - scitepress.org
Traffic characterization is one of the major challenges in today's security industry. The
continuous evolution and generation of new applications and services, together with the …

FlowPic: A generic representation for encrypted traffic classification and applications identification

T Shapira, Y Shavitt - IEEE Transactions on Network and …, 2021 - ieeexplore.ieee.org
Identifying the type of a network flow or a specific application has many advantages, such
as, traffic engineering, or to detect and prevent application or application types that violate …

Identifying encrypted malware traffic with contextual flow data

B Anderson, D McGrew - Proceedings of the 2016 ACM workshop on …, 2016 - dl.acm.org
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …

Robust network traffic classification

J Zhang, X Chen, Y Xiang, W Zhou… - IEEE/ACM transactions …, 2014 - ieeexplore.ieee.org
As a fundamental tool for network management and security, traffic classification has
attracted increasing attention in recent years. A significant challenge to the robustness of …

Deciphering malware's use of TLS (without decryption)

B Anderson, S Paul, D McGrew - Journal of Computer Virology and …, 2018 - Springer
The use of TLS by malware poses new challenges to network threat detection because
traditional pattern-matching techniques can no longer be applied to its messages. However …

A survey of techniques for internet traffic classification using machine learning

TTT Nguyen, G Armitage - IEEE communications surveys & …, 2008 - ieeexplore.ieee.org
The research community has begun looking for IP traffic classification techniques that do not
rely onwell known'TCP or UDP port numbers, or interpreting the contents of packet …

[图书][B] Conformal prediction for reliable machine learning: theory, adaptations and applications

V Balasubramanian, SS Ho, V Vovk - 2014 - books.google.com
The conformal predictions framework is a recent development in machine learning that can
associate a reliable measure of confidence with a prediction in any real-world pattern …