Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,390,834 papers from all fields of science
Search
Sign In
Create Free Account
Traffic analysis
Known as:
Traffic flow security
, Traffic-flow security
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
Alice and Bob
Anonymous Internet banking
Anonymous web browsing
BitTorrent
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
DREAM
M. Moshref
,
Minlan Yu
,
R. Govindan
,
Amin Vahdat
Conference on Applications, Technologies…
2014
Corpus ID: 9539717
Software-defined networks can enable a variety of concurrent, dynamically instantiated, measurement tasks, that provide fine…
Expand
Highly Cited
2012
Highly Cited
2012
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Kevin P. Dyer
,
Scott E. Coull
,
Thomas Ristenpart
,
Thomas Shrimpton
IEEE Symposium on Security and Privacy
2012
Corpus ID: 861248
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It…
Expand
Highly Cited
2007
Highly Cited
2007
Anonymity and security in delay tolerant networks
Aniket Kate
,
Gregory M. Zaverucha
,
U. Hengartner
Security and Privacy in Communication Networks
2007
Corpus ID: 15261398
A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where…
Expand
Highly Cited
2004
Highly Cited
2004
Sensitivity Analysis of Traffic Equilibria
M. Patriksson
Transportation Science
2004
Corpus ID: 11143958
The contribution of the paper is a complete analysis of the sensitivity of elastic demand traffic (Wardrop) equilibria. The…
Expand
Highly Cited
2004
Highly Cited
2004
On-chip traffic modeling and synthesis for MPEG-2 video applications
G. Varatkar
,
R. Marculescu
IEEE Transactions on Very Large Scale Integration…
2004
Corpus ID: 15907584
The objective of this paper is to introduce self-similarity as a fundamental property exhibited by the bursty traffic between on…
Expand
Highly Cited
2003
Highly Cited
2003
The IMPORTANT framework for analyzing the Impact of Mobility on Performance Of RouTing protocols for Adhoc NeTworks
F. Bai
,
Narayanan Sadagopan
,
A. Helmy
Ad hoc networks
2003
Corpus ID: 244328
Review
1999
Review
1999
On the teletraffic capacity of CDMA cellular networks
J. Evans
,
David Everitt
1999
Corpus ID: 15784373
The aim of this paper is to contribute to the understanding of the teletraffic behavior of code-division multiple-access (CDMA…
Expand
Review
1999
Review
1999
On multimedia networks: self-similar traffic and network performance
Z. Sahinoglu
,
S. Tekinay
IEEE Communications Magazine
1999
Corpus ID: 5611211
The main objective in telecommunications network engineering is to have as many happy users as possible. In other words, the…
Expand
Highly Cited
1998
Highly Cited
1998
Traffic Analysis of SSL Encrypted Web Browsing
H. Cheng
1998
Corpus ID: 14067436
The SSL protocol, an application-layer mechanism widely used for encrypted Web browsing, was not designed to address traffic…
Expand
Highly Cited
1990
Highly Cited
1990
Scheduling Networks of Queues: Heavy Traffic Analysis of a Two-Station Closed Network
P. Chevalier
,
L. Wein
Operational Research
1990
Corpus ID: 16449710
We consider a multiclass closed queueing network with two single-server stations. Each class requires service at a particular…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE