Adaptive packet padding approach for smart home networks: A tradeoff between privacy and performance
AJ Pinheiro, PF de Araujo-Filho… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The presence of connected devices in homes introduces numerous threats to privacy via the
analysis of the encrypted traffic these devices generate. Prior works have shown that traffic …
analysis of the encrypted traffic these devices generate. Prior works have shown that traffic …
Espada: Enhanced payload analyzer for malware detection robust against adversarial threats
The emergent communication technologies landscape has consolidated the anomaly-based
intrusion detection paradigm as one of the most prominent solutions able to discover …
intrusion detection paradigm as one of the most prominent solutions able to discover …
Network traffic obfuscation: An adversarial machine learning approach
An agent (D) aims to defend a network's traffic (T) from inference (classification) of
applications or protocols (P) traversing that nework by an attacker (A). D aims to confuse A …
applications or protocols (P) traversing that nework by an attacker (A). D aims to confuse A …
Optimizing honey traffic using game theory and adversarial learning
Enterprises are increasingly concerned about adversaries that slowly and deliberately
exploit resources over the course of months or even years. A key step in this kill chain is …
exploit resources over the course of months or even years. A key step in this kill chain is …
A realistic approach for network traffic obfuscation using adversarial machine learning
Adversaries are becoming more sophisticated and standard countermeasures such as
encryption are no longer enough to prevent traffic analysis from revealing important …
encryption are no longer enough to prevent traffic analysis from revealing important …
Strategic Cyber Camouflage
One of the most fundamental tasks for an AICA agent will be to manipulate information that
an adversary can observe, either about a network or the AICA agent itself. This includes …
an adversary can observe, either about a network or the AICA agent itself. This includes …
[PDF][PDF] Context-Aware Networking and Cybersecurity for Resilient Networking (Summary Technical Report, Oct 2017–Sep 2020)
This report summarizes research results over the life of the Experimental Methods in
Network Science project covering approximately 2017–2020. The project focused on two …
Network Science project covering approximately 2017–2020. The project focused on two …
Modeling prosumer behavior in the smart grid and implementing privacy design in IoT
M Rajabpour - 2022 - search.proquest.com
Smart cities include a diverse of set of infrastructures that are woven into the fabric of the
lives of its residents. These infrastructures range from communications to transportation to …
lives of its residents. These infrastructures range from communications to transportation to …
Game-Theoretic Deception Modeling for Distracting Network Adversaries
MS Miah - 2022 - search.proquest.com
In this day and age, adversaries in the cybersecurity space have become alarmingly
capable of identifying network vulnerabilities and work out various targets to attack where …
capable of identifying network vulnerabilities and work out various targets to attack where …
A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning
C Kiekintveld - Decision and Game Theory for Security: 11th …, 2020 - books.google.com
Adversaries are becoming more sophisticated and standard countermeasures such as
encryption are no longer enough to prevent traffic analysis from revealing important …
encryption are no longer enough to prevent traffic analysis from revealing important …