A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Measuring the performance and network utilization of popular video conferencing applications

K MacMillan, T Mangla, J Saxon… - Proceedings of the 21st …, 2021 - dl.acm.org
Video conferencing applications (VCAs) have become a critical Internet application during
the COVID-19 pandemic, as users worldwide now rely on them for work, school, and …

Skypemorph: Protocol obfuscation for tor bridges

H Mohajeri Moghaddam, B Li, M Derakhshani… - Proceedings of the …, 2012 - dl.acm.org
The Tor network is designed to provide users with low-latency anonymous communications.
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …

The parrot is dead: Observing unobservable network communications

A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …

Video telephony for end-consumers: Measurement study of Google+, iChat, and Skype

Y Xu, C Yu, J Li, Y Liu - Proceedings of the 2012 Internet Measurement …, 2012 - dl.acm.org
Video telephony requires high-bandwidth and low-delay voice and video transmissions
between geographically distributed users. It is challenging to deliver high-quality video …

Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?

R Alshammari, AN Zincir-Heywood - Computer networks, 2011 - Elsevier
Identifying encrypted application traffic represents an important issue for many network tasks
including quality of service, firewall enforcement and security. Solutions should ideally be …

Detailed analysis of skype traffic

D Bonfiglio, M Mellia, M Meo… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Skype is beyond any doubt the VoIP application in the current Internet application spectrum.
Its amazing success has drawn the attention of telecom operators and the research …

Profiling skype video calls: Rate control and video quality

X Zhang, Y Xu, H Hu, Y Liu, Z Guo… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
Video telephony has recently gained its momentum and is widely adopted by end-
consumers. But there have been very few studies on the network impacts of video calls and …

Per-frame energy consumption in 802.11 devices and its implication on modeling and design

P Serrano, A Garcia-Saavedra… - IEEE/ACM …, 2014 - ieeexplore.ieee.org
This paper provides an in-depth understanding of the per-frame energy consumption
behavior in 802.11 wireless LAN devices. Extensive measurements are performed for seven …

A comparative study of RTC applications

A Nistico, D Markudova, M Trevisan… - … on Multimedia (ISM), 2020 - ieeexplore.ieee.org
Real-Time Communication (RTC) applications have become ubiquitous and are nowadays
fundamental for people to communicate with friends and relatives, as well as for enterprises …