Smartphone app usage analysis: Datasets, methods, and applications

T Li, T Xia, H Wang, Z Tu, S Tarkoma… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
As smartphones have become indispensable personal devices, the number of smartphone
users has increased dramatically over the last decade. These personal devices, which are …

Workload characterization: A survey revisited

MC Calzarossa, L Massari, D Tessera - ACM Computing Surveys (CSUR …, 2016 - dl.acm.org
Workload characterization is a well-established discipline that plays a key role in many
performance engineering studies. The large-scale social behavior inherent in the …

Toward a reliable anomaly-based intrusion detection in real-world environments

EK Viegas, AO Santin, LS Oliveira - Computer Networks, 2017 - Elsevier
A popular approach for detecting network intrusion attempts is to monitor the network traffic
for anomalies. Extensive research effort has been invested in anomaly-based network …

Big data driven hidden Markov model based individual mobility prediction at points of interest

Q Lv, Y Qiao, N Ansari, J Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
With the emergence of smartphones and location-based services, user mobility prediction
has become a critical enabler for a wide range of applications, like location-based …

Characteristics of viral messages on Telegram; The world's largest hybrid public and private messenger

AD Nobari, MHKM Sarraf, M Neshati… - Expert systems with …, 2021 - Elsevier
Telegram is a new Instant Messaging application providing key features for both public and
private messaging. Telegram is similar to group broadcast or micro-blogging platforms …

Analysis of Telegram, an instant messaging service

A Dargahi Nobari, N Reshadatmand… - Proceedings of the 2017 …, 2017 - dl.acm.org
Telegram has become one of the most successful instant messaging services in recent
years. In this paper, we developed a crawler to gather its public data. To the best of our …

Multi-stage jamming attacks detection using deep learning combined with kernelized support vector machine in 5g cloud radio access networks

M Hachimi, G Kaddoum, G Gagnon… - … symposium on networks …, 2020 - ieeexplore.ieee.org
In 5G networks, the Cloud Radio Access Network (C-RAN) is considered a promising future
architecture in terms of minimizing energy consumption and allocating resources efficiently …

A mobility analytical framework for big mobile data in densely populated area

Y Qiao, Y Cheng, J Yang, J Liu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Due to the pervasiveness of mobile devices, a vast amount of geolocated data is generated,
which allows us to gain deep insight into human behavior. Among other data sources, the …

To what extent we repeat ourselves? Discovering daily activity patterns across mobile app usage

T Li, Y Li, MA Hoque, T Xia… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the prevalence of smartphones, people have left abundant behavior records in
cyberspace. Discovering and understanding individuals' cyber activities can provide useful …

Analysis of Smart Citizens: A Fuzzy Based Approach

MW Nadeem, M Hussain, MA Khan… - 2019 International …, 2019 - ieeexplore.ieee.org
Advancement in the technology is drawing an positive and prosperous impact on human life.
Thus, the development of smart city applications and services enhances the way of life style …