Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encrypted traffic
biblio
Unveiling MIMETIC: Interpreting Deep Learning Traffic Classifiers via XAI Techniques
Submitted by grigby1 on Wed, 12/22/2021 - 11:54am
deep learning
encrypted traffic
explainable artificial intelligence
internet
law enforcement
learning (artificial intelligence)
Limiting
Mobile Applications
Mobile handsets
Multimodal learning
pubcrawl
resilience
Resiliency
Scalability
Traffic classification
xai
biblio
EZAC: Encrypted Zero-Day Applications Classification Using CNN and K-Means
Submitted by grigby1 on Tue, 12/21/2021 - 11:37am
CNN
Collaborative Work
composability
Conferences
convolutional neural networks
defense
encrypted traffic
encryption
k-means
Metrics
pubcrawl
resilience
Resiliency
Traffic classification
Zero day attacks
zero-day application
biblio
Analysis of Encrypted Traffic with time-based features and time frequency analysis
Submitted by aekwall on Mon, 11/08/2021 - 2:27pm
security
machine learning
pubcrawl
Scalability
Resiliency
Predictive Metrics
encrypted traffic
Time Frequency Analysis
Time Frequency Analysis and Security
biblio
Profiling of secure chat and calling apps from encrypted traffic
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
nonreadable contents
ios
android
chat and voice/ video app
chat apps
cryptograhically secure sessions
encrypted traffic
iOS mobile platform
network forensic
Windows
secure app
secure chat profiling
service provider networks
voice/ video apps
voice/ video calling apps
voice/ video calls
iOS Security
internet
Cryptography
Protocols
Trusted Computing
mobile computing
Resiliency
pubcrawl
Social network services
Metrics
Servers
Forensics
Data mining
security architecture
Human Factors
Android (operating system)
confidentiality
Compositionality
biblio
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
privacy
Web sites
Web site identification
Web pages
Vectors
upstream bandwidth
traffic morphing scheme
traffic analysis countermeasures
traffic analysis attack
TLS
telecommunication traffic
TA attack
Support vector machines
SSH
security
Accuracy
padding
machine learning
IPsec
hypermedia
HTTP traffic
general-purpose TA countermeasures
encryption
encrypted tunnel
encrypted traffic
downstream bandwidth
Cryptography
Bandwidth
attack/countermeasure pairings