[HTML][HTML] Cloud-gaming: Analysis of google stadia traffic

M Carrascosa, B Bellalta - Computer Communications, 2022 - Elsevier
Interactive, real-time, and high-quality cloud video games pose a serious challenge to the
Internet due to simultaneous high-throughput and low round trip delay requirements. In this …

Measuring the performance and network utilization of popular video conferencing applications

K MacMillan, T Mangla, J Saxon… - Proceedings of the 21st …, 2021 - dl.acm.org
Video conferencing applications (VCAs) have become a critical Internet application during
the COVID-19 pandemic, as users worldwide now rely on them for work, school, and …

Participatory networking: An API for application control of SDNs

AD Ferguson, A Guha, C Liang, R Fonseca… - ACM SIGCOMM …, 2013 - dl.acm.org
We present the design, implementation, and evaluation of an API for applications to control a
software-defined network (SDN). Our API is implemented by an OpenFlow controller that …

[图书][B] An introduction to search engines and web navigation

M Levene - 2011 - books.google.com
This book is a second edition, updated and expanded to explain the technologies that help
us find information on the web. Search engines and web navigation tools have become …

Machine learning based encrypted traffic classification: Identifying ssh and skype

R Alshammari… - 2009 IEEE symposium on …, 2009 - ieeexplore.ieee.org
The objective of this work is to assess the robustness of machine learning based traffic
classification for classifying encrypted traffic where SSH and Skype are taken as good …

Green cloud multimedia networking: NFV/SDN based energy-efficient resource allocation

A Montazerolghaem, MH Yaghmaee… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The rapid growth of communications and multimedia network services such as Voice over
Internet Protocol (VoIP) have caused these networks to face a crisis in resources from two …

I know what you saw last minute—encrypted http adaptive video streaming title classification

R Dubin, A Dvir, O Pele, O Hadar - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Desktops can be exploited to violate privacy. There are two main types of attack scenarios:
active and passive. We consider the passive scenario where the adversary does not interact …

Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application

J Muehlstein, Y Zion, M Bahumi… - 2017 14th IEEE …, 2017 - ieeexplore.ieee.org
Desktops and laptops can be maliciously exploited to violate privacy. There are two main
types of attack scenarios: active and passive. In this paper, we consider the passive scenario …

Cover your acks: Pitfalls of covert channel censorship circumvention

J Geddes, M Schuchard, N Hopper - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
In response to increasingly sophisticated methods of blocking access to censorship
circumvention schemes such as Tor, recently proposed systems such as Skypemorph …

[PDF][PDF] 网络流量分类研究进展与展望

熊刚, 孟姣, 曹自刚, 王勇, 郭莉, 方滨兴 - 集成技术, 2012 - academia.edu
摘要近年来, 随着互联网的迅猛发展, 越来越多的新型网络应用逐渐兴起, 网络规模不断扩大,
网络组成也越来越复杂. 网络流量分类技术作为增强网络可控性的基础技术之一 …