Obfuscation of sensitive data for incremental release of network flows

D Riboni, A Villani, D Vitali, C Bettini… - … /ACM Transactions on …, 2014 - ieeexplore.ieee.org
Large datasets of real network flows acquired from the Internet are an invaluable resource
for the research community. Applications include network modeling and simulation …

An efficient user identification approach based on Netflow analysis

A Bakhshandeh, Z Eskandari - 2018 15th International ISC …, 2018 - ieeexplore.ieee.org
With the advent of new technologies such as cloud-based services, smart phones, tablets
and etc. users' connectivity to networks are inevitable. This will result in the generation of …

Multi-observer privacy-preserving hidden markov models

HX Nguyen, M Roughan - IEEE transactions on signal …, 2013 - ieeexplore.ieee.org
Detection of malicious traffic and network health problems would be much easier if Internet
Service Providers (ISPs) shared their data. Unfortunately, they are reluctant to share …

Behavior-based network traffic synthesis

Y Song, SJ Stolfo, T Jebara - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Modern network security research has demonstrated a clear necessity for open sharing of
traffic datasets between organizations-a need that has so far been superseded by the …

[PDF][PDF] Systematic assessment of the impact of user roles on network flow patterns

JS Dean - 2017 - researchgate.net
Defining normal computer user behavior is critical to detecting potentially malicious activity.
To facilitate this, some anomaly-detection systems group the profiles of users expected to …

Data summarizations for scalable, robust and privacy-aware learning in high dimensions

D Manousakas - 2021 - repository.cam.ac.uk
The advent of large-scale datasets has offered unprecedented amounts of information for
building statistically powerful machines, but, at the same time, also introduced a remarkable …

Alleviation of Delay in Tele-Surgical Operations Using Markov Approach-Based Smith Predictor

R Kumar, R Kumar, MJ Nigam - International Journal of Business …, 2022 - igi-global.com
The acceptance of tele-robotics and teleoperations through networked control system (NCS)
is increasing day-by-day. NCS involves the feedback control loop system wherein the …

[PDF][PDF] A Survey on Hidden Markov Model for IT Service Management

V Vijayalakshmi, P Mahalakshmi, S Thamizharasan - ijcset.com
Network management refers to the actions, techniques, proceedings, and tools that are
related to the process, governance, upholding, and stipulating of networked systems …

[引用][C] Markov Chain analysis of packet sequence for intrusion detection

C Bockholt - 2017