Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Traffic analysis

Known as: Traffic flow security, Traffic-flow security 
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
A great deal of attention has been given to deep learning over the past several years, and new deep learning techniques are… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Tor is the second generation onion router supporting the anonymous transport of TCP streams over the Internet. Its low latency… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic analysis methods that detect and… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Wireless sensor networks are highly vulnerable to the failure of base stations. An adversary can render a wireless sensor network… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This report describes a process and acts as guidelines for the recommended use of traffic microsimulation software in… Expand
  • figure 15
Is this relevant?
Highly Cited
2002
Highly Cited
2002
  • Andrew Hintz
  • Privacy Enhancing Technologies
  • 2002
  • Corpus ID: 206616873
I present a traffic analysis based vulnerability in SafeWeb, an encrypting web proxy. This vulnerability allows someone… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We discuss problems and trade-offs with systems providing anonymity for web browsing (or more generally any communication system… Expand
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we… Expand
Is this relevant?