Darknet Traffic Analysis: A Systematic Literature Review

J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …

Determining susceptible body parts of construction workers due to occupational injuries using inclusive modelling

K Koc, Ö Ekmekcioğlu, AP Gurgun - Safety science, 2023 - Elsevier
Despite significant progress has been made in safety management practices, construction
industry still accounts for a substantial number of occupational accidents leading to injuries …

Applications of Generative AI (GAI) for Mobile and Wireless Networking: A Survey

TH Vu, SK Jagatheesaperumal, MD Nguyen… - arXiv preprint arXiv …, 2024 - arxiv.org
The success of Artificial Intelligence (AI) in multiple disciplines and vertical domains in
recent years has promoted the evolution of mobile networking and the future Internet toward …

Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition

S Niktabe, AH Lashkari, DP Sharma - International Journal of Information …, 2024 - Springer
The domain name system (DNS) protocol has been used for over three decades. It plays a
vital role in the functioning of the Internet by facilitating the conversion of domain names into …

Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables

JM Adeke, G Liu, J Zhao, N Wu, HM Bashir - Future Internet, 2023 - mdpi.com
Machine learning (ML) models are essential to securing communication networks. However,
these models are vulnerable to adversarial examples (AEs), in which malicious inputs are …

Traffic classification in SDN-based IoT network using two-level fused network with self-adaptive manta ray foraging

MA Aleisa - Scientific Reports, 2025 - nature.com
The rapid expansion of IoT networks, combined with the flexibility of Software-Defined
Networking (SDN), has significantly increased the complexity of traffic management …

Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning

S Niktabe, AH Lashkari, AH Roudsari - Peer-to-Peer Networking and …, 2024 - Springer
Encrypted domain name resolution can reduce the risk of privacy leakage for Internet users.
However, it may also prevent network administrators from detecting suspicious …

Network anomaly detection via similarity-aware ensemble learning with ADSim

W Chen, Z Wang, L Chang, K Wang, Y Zhong, D Han… - Computer Networks, 2024 - Elsevier
The last decade has seen the increasing application of machine learning to various tasks,
including network anomaly detection. But anomaly detection methods based on a single …

[HTML][HTML] Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis

A Mezina, R Burget, A Ometov - Computer Networks, 2024 - Elsevier
With a growing number of smart interconnected devices and services, managing and
controlling network traffic is getting more complicated. Among the network traffic, the Darknet …

RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification

X Xiao, S Wang, G Hu, Q Li, K Mao… - … on Dependable and …, 2024 - ieeexplore.ieee.org
Network traffic classification plays a crucial role in network management and cyberspace
security. As the Internet evolves with new applications and protocols, traditional machine …