Skip to search formSkip to main contentSkip to account menu

Traffic analysis

Known as: Traffic flow security, Traffic-flow security 
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Software-defined networks can enable a variety of concurrent, dynamically instantiated, measurement tasks, that provide fine… 
Highly Cited
2012
Highly Cited
2012
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It… 
Highly Cited
2007
Highly Cited
2007
A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where… 
Highly Cited
2004
Highly Cited
2004
The contribution of the paper is a complete analysis of the sensitivity of elastic demand traffic (Wardrop) equilibria. The… 
Highly Cited
2004
Highly Cited
2004
The objective of this paper is to introduce self-similarity as a fundamental property exhibited by the bursty traffic between on… 
Review
1999
Review
1999
The aim of this paper is to contribute to the understanding of the teletraffic behavior of code-division multiple-access (CDMA… 
Review
1999
Review
1999
The main objective in telecommunications network engineering is to have as many happy users as possible. In other words, the… 
Highly Cited
1998
Highly Cited
1998
The SSL protocol, an application-layer mechanism widely used for encrypted Web browsing, was not designed to address traffic… 
Highly Cited
1990
Highly Cited
1990
We consider a multiclass closed queueing network with two single-server stations. Each class requires service at a particular…