You are currently on the new version of our website. Access the old version .

178 Results Found

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,375 Views
27 Pages

30 March 2023

Monitoring the evolution of the state of networks is an important issue to ensure that many applications provide the required quality of service. The first step in network-monitoring systems consists of capturing packets; that is, packets arrive at t...

  • Article
  • Open Access
7 Citations
2,380 Views
22 Pages

7 April 2024

The rapid evolution of technology has fostered an exponential rise in the number of individuals and devices interconnected via the Internet. This interconnectedness has prompted companies to expand their computing and communication infrastructures si...

  • Article
  • Open Access
7 Citations
2,442 Views
13 Pages

22 January 2023

Vehicular ad hoc networks (VANETs) have recently drawn a large amount of attention because of their enormous potential in road safety improvement and traffic management as well as infotainment service support. As the standard of medium access control...

  • Article
  • Open Access
3 Citations
5,129 Views
11 Pages

Currently, network environments are complex infrastructures with different levels of security, isolation and permissions. The management of these networks is a complex task, faced with different issues such as adversarial attacks, user demands, virtu...

  • Article
  • Open Access
1,228 Views
10 Pages

Investigating exciton dynamics within DNA nucleobases is essential for comprehensively understanding how inherent photostability mechanisms function at the molecular level, particularly in the context of life’s resilience to solar radiation. In...

  • Article
  • Open Access
4 Citations
3,952 Views
20 Pages

Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data

  • Mingshu He,
  • Xiaojuan Wang,
  • Lei Jin,
  • Bingying Dai,
  • Kaiwenlv Kacuila and
  • Xiaosu Xue

3 September 2021

Information and communication technologies have essential impacts on people’s life. The real time convenience of the internet greatly facilitates the information transmission and knowledge exchange of users. However, network intruders utilize some co...

  • Article
  • Open Access
471 Views
21 Pages

26 September 2025

In the process of digital transformation, the performance diagnosis of server systems is crucial for ensuring service continuity and enhancing user experience. Addressing the issues of invasiveness, poor universality, and difficulty in precisely loca...

  • Article
  • Open Access
3 Citations
1,679 Views
23 Pages

ISLS: An Illumination-Aware Sauce-Packet Leakage Segmentation Method

  • Shuai You,
  • Shijun Lin,
  • Yujian Feng,
  • Jianhua Fan,
  • Zhenzheng Yan,
  • Shangdong Liu and
  • Yimu Ji

18 May 2024

The segmentation of abnormal regions is vital in smart manufacturing. The blurring sauce-packet leakage segmentation task (BSLST) is designed to distinguish the sauce packet and the leakage’s foreground and background at the pixel level. Howeve...

  • Article
  • Open Access
1 Citations
1,290 Views
20 Pages

SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features

  • Tieqi Xi,
  • Qiuhua Zheng,
  • Chuanhui Cheng,
  • Ting Wu,
  • Guojie Xie,
  • Xuebiao Qian,
  • Haochen Ye and
  • Zhenyu Sun

Network traffic classification is crucial for effective security management. However, the increasing prevalence of encrypted traffic and the confidentiality of protocol details have made this task more challenging. To address this issue, we propose a...

  • Article
  • Open Access
1 Citations
3,082 Views
19 Pages

23 February 2023

Currently, most of the existing link parameter prediction schemes assume that the link state remains constant during the measurement period, making it difficult to capture their time-varying characteristics. To solve this problem, this paper proposes...

  • Article
  • Open Access
1,986 Views
24 Pages

A Generalized and Real-Time Network Intrusion Detection System Through Incremental Feature Encoding and Similarity Embedding Learning

  • Zahraa kadhim Alitbi,
  • Seyed Amin Hosseini Seno,
  • Abbas Ghaemi Bafghi and
  • Davood Zabihzadeh

11 August 2025

Many Network Intrusion Detection Systems (NIDSs) process sessions only after their completion, relying on statistical features generated by tools such as CICFlowMeter. Thus, they cannot be used for real-time intrusion detection. Packet-based NIDSs ad...

  • Article
  • Open Access
17 Citations
4,430 Views
12 Pages

With the rapid development of IoT (Internet of Things), massive data is delivered through trillions of interconnected smart devices. The heterogeneous networks trigger frequently the congestion and influence indirectly the application of IoT. The tra...

  • Article
  • Open Access
32 Citations
6,737 Views
24 Pages

A Cost-Efficient Software Based Router and Traffic Generator for Simulation and Testing of IP Network

  • Su Jun,
  • Krzysztof Przystupa,
  • Mykola Beshley,
  • Orest Kochan,
  • Halyna Beshley,
  • Mykhailo Klymash,
  • Jinfei Wang and
  • Daniel Pieniak

The development was carried out using the Qt5.2 integrated development environment, which uses the programming language C++. The main advantage of this environment is that the code written in it can be compiled to different platforms (for example, Wi...

  • Article
  • Open Access
29 Citations
5,218 Views
12 Pages

Network Anomaly Detection inside Consumer Networks—A Hybrid Approach

  • Darsh Patel,
  • Kathiravan Srinivasan,
  • Chuan-Yu Chang,
  • Takshi Gupta and
  • Aman Kataria

With an increasing number of Internet of Things (IoT) devices in the digital world, the attack surface for consumer networks has been increasing exponentially. Most of the compromised devices are used as zombies for attacks such as Distributed Denial...

  • Article
  • Open Access
44 Citations
4,918 Views
21 Pages

19 December 2019

In cluster-based wireless sensor networks, cluster heads (CHs) gather and fuse data packets from sensor nodes; then, they forward fused packets to the sink node (SN). This helps wireless sensor networks balance energy effectively and efficiently to p...

  • Article
  • Open Access
3 Citations
2,207 Views
19 Pages

The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks

  • Andy Reed,
  • Laurence Dooley and
  • Soraya Kouadri Mostefaoui

28 August 2024

The pernicious impact of malicious Slow DoS (Denial of Service) attacks on the application layer and web-based Open Systems Interconnection model services like Hypertext Transfer Protocol (HTTP) has given impetus to a range of novel detection strateg...

  • Article
  • Open Access
2 Citations
3,355 Views
9 Pages

28 March 2019

Remote code execution attacks against network devices become major challenges in securing networking environments. In this paper, we propose a detection framework against remote code execution attacks for closed source network devices using virtualiz...

  • Article
  • Open Access
1,427 Views
27 Pages

Online Traffic Obfuscation Experimental Framework for the Smart Home Privacy Protection

  • Shuping Huang,
  • Jianyu Cao,
  • Ziyi Chen,
  • Qi Zhong and
  • Minghe Zhang

19 August 2025

Attackers can use Ethernet or WiFi sniffers to capture smart home device traffic and identify device events based on packet length and timing characteristics, thereby inferring users’ home behaviors. To address this issue, traffic obfuscation t...

  • Article
  • Open Access
7 Citations
5,960 Views
23 Pages

iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF

  • Hassan Jalil Hadi,
  • Mubashir Adnan,
  • Yue Cao,
  • Faisal Bashir Hussain,
  • Naveed Ahmad,
  • Mohammed Ali Alshara and
  • Yasir Javed

The development of new technologies has significantly enhanced the monitoring and analysis of network traffic. Modern solutions like the Extended Berkeley Packet Filter (eBPF) demonstrate a clear advancement over traditional techniques, allowing for...

  • Article
  • Open Access
12 Citations
8,173 Views
16 Pages

A Deep Learning-Based Encrypted VPN Traffic Classification Method Using Packet Block Image

  • Weishi Sun,
  • Yaning Zhang,
  • Jie Li,
  • Chenxing Sun and
  • Shuzhuang Zhang

27 December 2022

Network traffic classification has great significance for network security, network management and other fields. However, in recent years, the use of VPN and TLS encryption had presented network traffic classification with new challenges. Due to the...

  • Article
  • Open Access
20 Citations
4,969 Views
20 Pages

Hiding the Source Based on Limited Flooding for Sensor Networks

  • Juan Chen,
  • Zhengkui Lin,
  • Ying Hu and
  • Bailing Wang

17 November 2015

Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the bas...

  • Article
  • Open Access
2,319 Views
17 Pages

30 May 2022

In terms of low power consumption and long-range communication—low-power wide-area networks (LPWAN) are suitable for wireless sensor networks. Long-range (LoRa) wireless communication is one of the standards of LPWAN. LoRa shares common frequen...

  • Article
  • Open Access
11 Citations
14,226 Views
14 Pages

Directional MAC Approach for Wireless Body Area Networks

  • Md. Asdaque Hussain,
  • Md. Nasre Alam and
  • Kyung Sup Kwak

12 January 2011

Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medica...

  • Article
  • Open Access
26 Citations
14,012 Views
33 Pages

Source nodes in wireless image sensor networks transmit much more information than traditional scalar sensor networks, thereby demanding more energy of intermediate relaying nodes and putting energy efficiency as a key design issue. Intermediate node...

  • Article
  • Open Access
43 Citations
6,758 Views
16 Pages

BFCN: A Novel Classification Method of Encrypted Traffic Based on BERT and CNN

  • Zhaolei Shi,
  • Nurbol Luktarhan,
  • Yangyang Song and
  • Gaoqi Tian

With the speedy advancement of encryption technology and the exponential increase in applications, network traffic classification has become an increasingly important research topic. Existing methods for classifying encrypted traffic have certain lim...

  • Article
  • Open Access
151 Citations
19,656 Views
17 Pages

Wireless Sensor/Actuator Network Design for Mobile Control Applications

  • Feng Xia,
  • Yu-Chu Tian,
  • Yanjun Li and
  • Youxian Sung

9 October 2007

Wireless sensor/actuator networks (WSANs) are emerging as a new generationof sensor networks. Serving as the backbone of control applications, WSANs will enablean unprecedented degree of distributed and mobile control. However, the unreliability ofwi...

  • Article
  • Open Access
9 Citations
2,036 Views
15 Pages

Research on Vertical SEC Centrifugal Pump Multi-Fault Diagnosis Based on WPT–SVM

  • Rongsheng Zhu,
  • Yunpeng Li,
  • Qian Huang,
  • Sihan Li,
  • Xinyu Zhang,
  • Huairui Li and
  • Qiang Fu

18 November 2023

To diagnose common failures in vertical Essential Service Water Pumps (SEC), a method combining the wavelet packet transform (WPT) and the support vector machine (SVM) was adopted. This allowed us to construct a diagnostic model capable of classifyin...

  • Article
  • Open Access
1 Citations
825 Views
27 Pages

A Dynamic Website Fingerprinting Defense by Emulating Spatio-Temporal Traffic Features

  • Dongfang Zhang,
  • Chen Rao,
  • Jianan Huang,
  • Lei Guan,
  • Manjun Tian and
  • Weiwei Liu

14 November 2025

Website fingerprinting (WF) attacks analyze encrypted network traffic to exploit side-channel features such as packet sizes, inter-packet timings, and burst patterns, enabling adversaries to infer users’ browsing activities and posing persisten...

  • Article
  • Open Access
3 Citations
3,769 Views
22 Pages

Data Stream Processing for Packet-Level Analytics

  • Alessandra Fais,
  • Giuseppe Lettieri,
  • Gregorio Procissi,
  • Stefano Giordano and
  • Francesco Oppedisano

3 March 2021

One of the most challenging tasks for network operators is implementing accurate per-packet monitoring, looking for signs of performance degradation, security threats, and so on. Upon critical event detection, corrective actions must be taken to keep...

  • Article
  • Open Access
1 Citations
2,011 Views
13 Pages

27 June 2024

Pipelines are an important transportation form in industry. However, pipeline corrosion, particularly that occurring internally, poses a significant threat to safe operations. To detect the internal corrosion of a pipeline, a method utilizing piezoel...

  • Article
  • Open Access
1 Citations
1,254 Views
24 Pages

26 February 2025

Recently, with the advantages of easy deployment, flexibility, diverse functions, and low cost, flying ad hoc network (FANET) has captured great attention for its huge potential in military and civilian applications, whereas the high-speed movement a...

  • Article
  • Open Access
16 Citations
5,169 Views
23 Pages

28 August 2018

Linear Support Vector Machine (LSVM) has proven to be an effective approach for link classification in sensor networks. In this paper, we present a data-driven framework for reliable link classification that models Kernelized Linear Support Vector Ma...

  • Data Descriptor
  • Open Access
2 Citations
4,620 Views
11 Pages

Wearable Device Bluetooth/BLE Physical Layer Dataset

  • Artis Rusins,
  • Deniss Tiscenko,
  • Eriks Dobelis,
  • Eduards Blumbergs,
  • Krisjanis Nesenbergs and
  • Peteris Paikens

3 April 2024

Wearable devices, such as headsets and activity trackers, rely heavily on the Bluetooth and/or the Bluetooth Low Energy wireless communication standard to exchange data with smartphones or other peripherals. Since these devices collect personal healt...

  • Feature Paper
  • Article
  • Open Access
6 Citations
3,817 Views
19 Pages

Adaptive Real-Time Routing Protocol for (m,k)-Firm in Industrial Wireless Multimedia Sensor Networks

  • Beom-Su Kim,
  • Sangdae Kim,
  • Kyong Hoon Kim,
  • Tae-Eung Sung,
  • Babar Shah and
  • Ki-Il Kim

14 March 2020

Many applications are able to obtain enriched information by employing a wireless multimedia sensor network (WMSN) in industrial environments, which consists of nodes that are capable of processing multimedia data. However, as many aspects of WMSNs s...

  • Article
  • Open Access
18 Citations
4,563 Views
22 Pages

INTEGRATION Large-Scale Modeling Framework of Direct Cellular Vehicle-to-All (C-V2X) Applications

  • Mohamed M. G. Farag,
  • Hesham A. Rakha,
  • Emadeldin A. Mazied and
  • Jayanthi Rao

18 March 2021

The transportation system has evolved into a complex cyber-physical system with the introduction of wireless communication and the emergence of connected travelers and connected automated vehicles. Such applications create an urgent need to develop h...

  • Article
  • Open Access
8 Citations
2,689 Views
20 Pages

Bus-Passenger-Flow Prediction Model Based on WPD, Attention Mechanism, and Bi-LSTM

  • Yulong Pei,
  • Songmin Ran,
  • Wanjiao Wang and
  • Chuntong Dong

15 October 2023

The prediction of the bus passenger flow is crucial for efficient resource allocation, frequency setting, and route optimization in bus transit systems. However, it remains challenging for a single model to simultaneously capture the time-series data...

  • Article
  • Open Access
10 Citations
9,163 Views
28 Pages

31 December 2014

Network security requires real-time monitoring of network traffic in order to detect new and unexpected attacks. Attack detection methods based on deep packet inspection are time consuming and costly, due to their high computational demands. This pap...

  • Article
  • Open Access
3 Citations
4,882 Views
25 Pages

LAN Traffic Capture Applications Using the Libtins Library

  • Adrian-Tiberiu Costin,
  • Daniel Zinca and
  • Virgil Dobrota

11 December 2021

Capturing traffic and processing its contents is a valuable skill that when put in the right hands makes diagnosing and troubleshooting network issues an approachable task. Apart from aiding in fixing common problems, packet capture can also be used...

  • Article
  • Open Access
23 Citations
2,703 Views
25 Pages

Privacy-Aware Secure Routing through Elliptical Curve Cryptography with Optimal RSU Distribution in VANETs

  • Ghadeer Ghazi Shayea,
  • Dheyaa Abdulameer Mohammed,
  • Ali Hashim Abbas and
  • Nejood Faisal Abdulsattar

1 December 2022

Vehicular Ad-Hoc Networks (VANETs) are the backbone of the intelligent transportation system, which consists of high-speed vehicles with huge dynamic mobility. The communication takes place with a vehicle-to-vehicle, vehicle to infrastructure, with t...

  • Article
  • Open Access
6 Citations
3,353 Views
19 Pages

The emerging 5G mobile networks are essential enablers for mobile virtual reality (VR) video streaming applications assuring high quality of experience (QoE) at the end-user. In addition, mobile edge computing brings computational resources closer to...

  • Article
  • Open Access
1,395 Views
30 Pages

Data-Driven, Real-Time Diagnostics of 5G and Wi-Fi Networks Using Mobile Robotics

  • William O’Brien,
  • Adam Dooley,
  • Mihai Penica,
  • Sean McGrath and
  • Eoin O’Connell

Wireless connectivity plays a pivotal role in enabling real-time telemetry, sensor feedback, and autonomous navigation within Industry 4.0 environments. This paper presents a ROS 2-based mobile robotic platform designed to perform real-time network d...

  • Article
  • Open Access
1,925 Views
22 Pages

5 January 2025

The proliferation of IoT using heterogeneous wireless technologies within the unlicensed spectrum has intensified cross-technology interference (CTI) in wireless local area networks (WLANs). As WLANs increasingly adopt time-triggered transmission met...

  • Article
  • Open Access
3 Citations
2,353 Views
21 Pages

3 December 2023

The traditional vehicular ad hoc network (VANET), which is evolving into the internet of vehicles (IoV), has drawn great attention for its enormous potential in road safety improvement, traffic management, infotainment service support, and even auton...

  • Article
  • Open Access
1 Citations
693 Views
21 Pages

23 September 2025

The increasing deployment of internet of things(IoT) systems across critical domains has broadened the threat landscape, and being the catalyst for a variety of security concerns, including very stealthy slow denial of service (slow DoS) attacks. The...

  • Article
  • Open Access
1,453 Views
16 Pages

21 May 2025

Switch mode power supplies (SMPSs) are prone to various faults under complex operating environments and variable load conditions. To improve the accuracy and reliability of fault diagnosis, this paper proposes an intelligent diagnosis method based on...

  • Article
  • Open Access
26 Citations
9,024 Views
11 Pages

Wireless LAN-Based CSI Monitoring System for Object Detection

  • Tomoki Murakami,
  • Masahiko Miyazaki,
  • Shigemi Ishida and
  • Akira Fukuda

Sensing services for the detection of humans and animals by analyzing the environmental changes of wireless local area network (WLAN) signals have attracted attention in recent years. In object detection using WLAN signals, a widely known technique i...

  • Article
  • Open Access
1 Citations
2,460 Views
22 Pages

27 July 2021

In this paper, we consider the emerging context of ALOHA-based multi-static backscattering communication systems. By assuming an architecture consisting of a set of passive backscattering nodes, an illuminator, and a set of spatially dislocated recei...

  • Article
  • Open Access
29 Citations
6,788 Views
18 Pages

Predicting LoRaWAN Behavior: How Machine Learning Can Help

  • Francesca Cuomo,
  • Domenico Garlisi,
  • Alessio Martino and
  • Antonio Martino

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used...

  • Article
  • Open Access
1 Citations
2,708 Views
23 Pages

15 March 2025

Encrypted traffic classification is crucial for network security and management, enabling applications like QoS control and malware detection. However, the emergence of new encryption protocols, particularly TLS 1.3, poses challenges for traditional...

  • Review
  • Open Access
152 Citations
12,493 Views
29 Pages

22 February 2019

In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addr...

of 4