Smart user consumption profiling: Incremental learning-based OTT service degradation

JS Rojas, A Pekar, Á Rendón, JC Corrales - IEEE access, 2020 - ieeexplore.ieee.org
Data caps and service degradation are techniques used to control subscribers' data
consumption. These techniques have emerged mainly due to the growing demands placed …

An efficient user identification approach based on Netflow analysis

A Bakhshandeh, Z Eskandari - 2018 15th International ISC …, 2018 - ieeexplore.ieee.org
With the advent of new technologies such as cloud-based services, smart phones, tablets
and etc. users' connectivity to networks are inevitable. This will result in the generation of …

User profiling based on application-level using network metadata

F Shaman, B Ghita, N Clarke… - 2019 7th International …, 2019 - ieeexplore.ieee.org
There is an increasing interest to identify users and behaviour profiling from network traffic
metadata for traffic engineering and security monitoring. Network security administrators and …

Smart User Consumption Analysis Using Support Vector Machine and Multilayer Perceptron

MJ Omanga, OB Olajide, O James… - Asian Research Journal …, 2023 - jofscience.com
The advent of smart devices and the rapid growth of wireless and wired networks has
brought about a swift change in the methods of entertainment and information sources. This …

Over-the-top Applications Traffic Analysis Model for Networks using Multilayer Perceptron (MLP) and Long Short-term Memory (LSTM)

O James, OB Olajide, MJ Omanga - Asian Journal of Pure and Applied …, 2023 - jofmath.com
Abstract Over-the-top (OTT) applications are known for their large consumption of network
resources. Trailing to this, network operators need to efficiently classify network traffic …

[PDF][PDF] VALIDATION OF INDIVIDUAL IDENTIFICATION THROUGH DECISION TREE PACKET HEADER PROFILING.

K OSMAN, TNGQI FENG… - Asia-Pacific Journal …, 2022 - journalarticle.ukm.my
The drastic rise in the cybercrime rate associated with the surge of users' dependence on
the Internet has elevated the concern of digital forensic examiners toward the footprints of …

[PDF][PDF] Systematic assessment of the impact of user roles on network flow patterns

JS Dean - 2017 - researchgate.net
Defining normal computer user behavior is critical to detecting potentially malicious activity.
To facilitate this, some anomaly-detection systems group the profiles of users expected to …

User profiling based on network application traffic monitoring

F Shaman - 2020 - pearl.plymouth.ac.uk
There is increasing interest in identifying users and behaviour profiling from network traffic
metadata for traffic engineering and security monitoring. However, user identification and …

[PDF][PDF] Smart User Consumption Profiling: Incremental Learning-Based OTT Service Degradation

JC CORRALES - researchgate.net
Data caps and service degradation are techniques used to control subscribers' data
consumption. These techniques have emerged mainly due to the growing demands placed …

[PDF][PDF] User Profiling Based on Application-Level Using Network Metadata

A Alruban - 2019 - pearl.plymouth.ac.uk
There is an increasing interest to identify users and behaviour profiling from network traffic
metadata for traffic engineering and security monitoring. Network security administrators and …