IoT-based fall detection for smart home environments

S Greene, H Thapliyal… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
The rise of internet connected devices has enabledthe home with a vast amount of
enhancements to make lifemore convenient. These internet connected devices can be used …

Peerrush: Mining for unwanted p2p traffic

B Rahbarinia, R Perdisci, A Lanzi, K Li - … 2013, Berlin, Germany, July 18-19 …, 2013 - Springer
In this paper we present PeerRush, a novel system for the identification of unwanted P2P
traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can …

Are we missing labels? A study of the availability of ground-truth in network security research

S Abt, H Baier - 2014 third international workshop on building …, 2014 - ieeexplore.ieee.org
Network security is a long-lasting field of research constantly encountering new challenges.
Inherently, research in this field is highly data-driven. Specifically, many approaches employ …

Peerrush: Mining for unwanted p2p traffic

B Rahbarinia, R Perdisci, A Lanzi, K Li - Journal of Information Security and …, 2014 - Elsevier
In this paper we present PeerRush, a novel system for the identification of unwanted P2P
traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can …

[HTML][HTML] Traffic flow privacy protection with performance guarantee for classification in large networks (minor revision of INS_D_21_805R3)

H Tian - Information Sciences, 2023 - Elsevier
Privacy-preserving traffic flow classification has attracted a significant amount of research
interest because of its increasing importance to both network management and privacy …

An empirical study on TCP flow interarrival time distribution for normal and anomalous traffic

L Arshadi, AH Jahangir - International Journal of …, 2017 - Wiley Online Library
In this paper, we study the effects of anomalies on the distribution of TCP flow interarrival
time process. We show empirically that despite the variety of data networks in size, number …

P2P traffic identification using machine learning and feature selection techniques

MSA Ansari, K Pal, MC Govil, P Govil… - Edge Analytics: Select …, 2022 - Springer
Classification of Internet traffic based on its applications is significantly important for better
network management. The existing approaches for P2P traffic identification are port-based …

Safety detection algorithm in sensor network based on ant colony optimization with improved multiple clustering algorithms

L Zhu - Safety science, 2019 - Elsevier
The Sensing network attack connection has the characteristics of behavioral variability and
complexity. It is not feasible to construct an abnormal intrusion detection model by using …

Identifying peer‐to‐peer communities in the network by connection graph analysis

J Jusko, M Rehak - International Journal of Network …, 2014 - Wiley Online Library
In this paper we present a unified solution to identify peer‐to‐peer (P2P) communities
operating in the network. We propose an algorithm that is able to progressively discover …

Scan based testing of dual/multi core processors for small delay defects

AD Singh - 2008 IEEE International Test Conference, 2008 - ieeexplore.ieee.org
We present a new structural delay test methodology that identifies small timing anomalies in
dual/multi core processor circuits by comparing the relative switching time of identical circuit …