Searched for: subject%3A%22network%255C+traffic%22
(1 - 14 of 14)
document
Verhagen, Alexandra (author)
Accurate capacity planning is essential to ensure uninterrupted services and network stability through peak hours for the transport core network of KPN. This involves a trade-off between minimizing the risks of capacity shortages and costs of capacity expansions. High network loads are occurring more frequently and their magnitude is increasing....
master thesis 2024
document
Trap, Cyril (author)
Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...
master thesis 2023
document
Nadeem, A. (author), Verwer, S.E. (author)
Sequence clustering in a streaming environment is challenging because it is computationally expensive, and the sequences may evolve over time. K-medoids or Partitioning Around Medoids (PAM) is commonly used to cluster sequences since it supports alignment-based distances, and the k-centers being actual data items helps with cluster...
conference paper 2023
document
Graafmans, Roy (author)
Virtual private networks are often used to secure communication between two hosts and preserve privacy by tunneling all traffic over a single encrypted channel. Previous work has already shown that metadata of different secured channels can be used to fingerprint various kinds of information. In this work, we will dive into the encrypted tunnels...
master thesis 2021
document
Simidžioski, Maria (author)
Adversarial attacks pose a risk to machine learning (ML)-based network intrusion detection systems (NIDS). In this manner, it is of great significance to explore to what degree these methods can be viably utilized by potential adversaries. The majority of adversarial techniques are designed for unconstrained domains such as the image recognition...
master thesis 2021
document
Wang, Jin (author), Han, Hui (author), Li, H. (author), He, Shiming (author), Sharma, Pradip Kumar (author), Chen, Lydia Y. (author)
Due to high capacity and fast transmission speed, 5G plays a key role in modern electronic infrastructure. Meanwhile, sparse tensor factorization (STF) is a useful tool for dimension reduction to analyze high-order, high-dimension, and sparse tensor (HOHDST) data, which is transmitted on 5G Internet-of-things (IoT). Hence, HOHDST data relies...
journal article 2021
document
Nadeem, A. (author), Hammerschmidt, C.A. (author), Hernandez Ganan, C. (author), Verwer, S.E. (author)
Malware family labels are known to be inconsistent. They are also black-box since they do not represent the capabilities of malware. The current state of the art in malware capability assessment includes mostly manual approaches, which are infeasible due to the ever-increasing volume of discovered malware samples. We propose a novel...
book chapter 2021
document
Serentellos, V. (author)
Computer networks have nowadays assumed an increasingly important role in the expression of modern human activity through the ongoing rapid development in the field of Information and Communication Technologies (ICT). More and more individual users and businesses around the world are gaining access to networks online, while the range of services...
master thesis 2020
document
Krishnakumari, P.K. (author), Cats, O. (author), van Lint, J.W.C. (author)
The biggest challenge of analysing network traffic dynamics of large-scale networks is its complexity and pattern interpretability. In this work, we present a new computationally efficient method, inspired by human vision, to reduce the dimensions of a large-scale network and describe the traffic conditions with a compact, scalable and...
journal article 2020
document
Yuan, K. (author), Knoop, V.L. (author), Zwaal, B.A. (author), van Lint, J.W.C. (author)
With the renewed interest in the Macroscopic Fundamental Diagram (MFD) in the last decade, studies on network-level urban traffic control have increased in popularity. A popular urban traffic control approach is perimeter control, in which vehicle accumulation is kept below some critical accumulation value. An alternative control strategy is to...
conference paper 2020
document
Daamen, W. (author), van Binsbergen, A.J. (author), van Arem, B. (author), Hoogendoorn, S.P. (author)
The Urban Mobility Observatory (UMO) will gather, store, and disseminate empirical multi-modal traffic, transport and mobility data, using a well-balanced set of innovative data collection methods. It will make these comprehensive data available for scientific research to develop and test new theories and models to better understand, predict and...
conference paper 2020
document
Meijer, Wilko (author)
The mobile phone has become an important part of people's lives and which apps are used says a lot about a person. Even though data is encrypted, meta-data of network traffic leaks private information about which apps are being used on mobile devices.Apps can be detected in network traffic using the network fingerprint of an app, which shows...
master thesis 2019
document
Etta Tabe, Takang Kajikaw (author)
The volume and sophistication of data exfiltration attacks over networks have significantly increased in the last decade. This has resulted in the need for defense mechanisms, to effectively detect both known and unknown data exfiltration scenarios over the network. While methods such as DPI (Deep Packet Inspection) are commonly used to detect...
master thesis 2019
document
Shi, Gaomei (author)
In recent years, many countries and administrative domains exploit control over their communication infrastructures to censor online materials. The concrete reasons behind the Internet censorship remain poorly understood due to the opaque nature of the systems. Generally, Internet censorship is to disrupt the free flow of information. It involves...
master thesis 2019
Searched for: subject%3A%22network%255C+traffic%22
(1 - 14 of 14)