Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
I2P
biblio
Machine learning for anonymous traffic detection and classification
Submitted by grigby1 on Tue, 04/12/2022 - 12:14pm
Training
feature extraction
machine learning algorithms
security
pubcrawl
Human behavior
telecommunication traffic
Classification algorithms
Time series analysis
Tor
dark web
dark-web
I2P
JonDonym
Traffic classification
biblio
How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic?
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
JonDonym
traffic flow Identification
traffic flow behavior
Traffic flow
Tor
tools
telecommunication traffic
Resiliency
resilience
pubcrawl
Protocols
Metrics
machine learning
learning (artificial intelligence)
anonymity
internet
I2P
Human Factors
Human behavior
flow analysis approach
encryption
encrypted anonymity network traffic
dataset
data privacy
Cryptography
composability
Bandwidth
anonymity network users
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
biblio
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
Submitted by grigby1 on Fri, 11/03/2017 - 11:29am
government data processing
Web resource discovery
Web pages
Uniform resource locators
Tor
Terrorism
surface Web
search engines
information retrieval
I2P
hybrid focused crawling
homemade explosives discovery
pubcrawl
Freenet
focused crawling
explosives
Darknets
Crawlers
Context
classifier-guided hyperlink selection strategy
internet
dark web
Human Factors
Human behavior