A survey of public IoT datasets for network security research

F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …

A survey of routing and data dissemination in delay tolerant networks

CC Sobin, V Raychoudhury, G Marfia… - Journal of Network and …, 2016 - Elsevier
Abstract Delay Tolerant Networks (DTNs) have practical applications in various fields. DTNs
have been studied in-depth by many researchers and multiple high quality survey papers …

Impact of human mobility on opportunistic forwarding algorithms

A Chaintreau, P Hui, J Crowcroft, C Diot… - IEEE Transactions …, 2007 - ieeexplore.ieee.org
We study data transfer opportunities between wireless devices carried by humans. We
observe that the distribution of the intercontact time (the time gap separating two contacts …

Usilng machine learning technliques to identify botnet traffic

C Livadas, R Walsh, D Lapsley… - Proceedings. 2006 31st …, 2006 - ieeexplore.ieee.org
To date, techniques to counter cyber-attacks have predominantly been reactive; they focus
on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a …

On dominant characteristics of residential broadband internet traffic

G Maier, A Feldmann, V Paxson, M Allman - Proceedings of the 9th ACM …, 2009 - dl.acm.org
While residential broadband Internet access is popular in many parts of the world, only a few
studies have examined the characteristics of such traffic. In this paper we describe …

Extracting a mobility model from real user traces

M Kim, D Kotz, S Kim - 2006 - digitalcommons.dartmouth.edu
Understanding user mobility is critical for simulations of mobile devices in a wireless
network, but current mobility models often do not reflect real user movements. In this paper …

Nextplace: a spatio-temporal prediction framework for pervasive systems

S Scellato, M Musolesi, C Mascolo, V Latora… - … , Pervasive 2011, San …, 2011 - Springer
Accurate and fine-grained prediction of future user location and geographical profile has
interesting and promising applications including targeted content service, advertisement …

Early application identification

L Bernaille, R Teixeira, K Salamatian - Proceedings of the 2006 ACM …, 2006 - dl.acm.org
The automatic detection of applications associated with network traffic is an essential step
for network security and traffic engineering. Unfortunately, simple port-based classification …

Distributed community detection in delay tolerant networks

P Hui, E Yoneki, SY Chan, J Crowcroft - Proceedings of 2nd ACM/IEEE …, 2007 - dl.acm.org
Community is an important attribute of Pocket Switched Networks (PSN), because mobile
devices are carried by people who tend to belong to communities. We analysed community …

Access and mobility of wireless PDA users

M McNett, GM Voelker - ACM SIGMOBILE Mobile Computing and …, 2005 - dl.acm.org
In this paper, we analyze the mobility patterns of users of wireless hand-held PDAs in a
campus wireless network using an eleven week trace of wireless network activity. Our study …