A survey of compiler testing

J Chen, J Patra, M Pradel, Y Xiong, H Zhang… - ACM Computing …, 2020 - dl.acm.org
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

HEDGE: efficient traffic classification of encrypted and compressed packets

F Casino, KKR Choo, C Patsakis - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …

Comparison of entropy calculation methods for ransomware encrypted file identification

SR Davies, R Macfarlane, WJ Buchanan - Entropy, 2022 - mdpi.com
Ransomware is a malicious class of software that utilises encryption to implement an attack
on system availability. The target's data remains encrypted and is held captive by the …

EnCoD: Distinguishing Compressed and Encrypted File Fragments

F De Gaspari, D Hitaj, G Pagnotta, L De Carli… - Network and System …, 2020 - Springer
Reliable identification of encrypted file fragments is a requirement for several security
applications, including ransomware detection, digital forensics, and traffic analysis. A …

Reliable detection of compressed and encrypted data

F De Gaspari, D Hitaj, G Pagnotta, L De Carli… - Neural Computing and …, 2022 - Springer
Several cybersecurity domains, such as ransomware detection, forensics and data analysis,
require methods to reliably identify encrypted data fragments. Typically, current approaches …

An empirical approach towards characterization of encrypted and unencrypted VoIP traffic

P Choudhury, KRP Kumar, S Nandi… - Multimedia Tools and …, 2020 - Springer
VoIP traffic classification plays a major role towards network policy enforcements.
Characterization of VoIP media traffic is based on codec behaviour. With the introduction of …

Combining raw data and engineered features for optimizing encrypted and compressed internet of things traffic classification

MM Saleh, M AlSlaiman, MI Salman, B Wang - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things (IoT) is used in many fields that generate sensitive data, such
as healthcare and surveillance. The increased reliance on IoT raised serious information …

Prognosis negative: Evaluating real-time behavioral ransomware detectors

A Gupta, A Prakash, N Scaife - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Ransomware attacks continue to grow in both severity and prevalence as attackers target
public infrastructure, governments, and companies. This problem has spawned a wide …

Analysis of iot traffic using http proxy

O Kayode, AS Tosun - ICC 2019-2019 IEEE International …, 2019 - ieeexplore.ieee.org
In this current era of Internet of Things, data privacy and security of internet enabled devices
has become a major concern of many users and manufacturers. Massive amount of data is …