{"id":"https://openalex.org/W2964557051","doi":"https://doi.org/10.1109/tsp.2019.8768885","title":"Accuracy of statistical machine learning methods in identifying client behavior patterns at network edge","display_name":"Accuracy of statistical machine learning methods in identifying client behavior patterns at network edge","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2964557051","doi":"https://doi.org/10.1109/tsp.2019.8768885","mag":"2964557051"},"language":"en","primary_location":{"id":"doi:10.1109/tsp.2019.8768885","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp.2019.8768885","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013116822","display_name":"Michal Zygmunt","orcid":null},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Michal Zygmunt","raw_affiliation_strings":["Department of Computer Science AGH, University of Science and Technology, Krakow, Poland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science AGH, University of Science and Technology, Krakow, Poland","institution_ids":["https://openalex.org/I686019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058488129","display_name":"Marek Konieczny","orcid":"https://orcid.org/0000-0002-1167-8568"},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marek Konieczny","raw_affiliation_strings":["Department of Computer Science AGH, University of Science and Technology, Krakow, Poland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science AGH, University of Science and Technology, Krakow, Poland","institution_ids":["https://openalex.org/I686019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003012723","display_name":"S\u0142awomir Zieli\u0144ski","orcid":"https://orcid.org/0000-0002-0824-2608"},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Slawomir Zielinski","raw_affiliation_strings":["Department of Computer Science AGH, University of Science and Technology, Krakow, Poland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science AGH, University of Science and Technology, Krakow, Poland","institution_ids":["https://openalex.org/I686019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013116822"],"corresponding_institution_ids":["https://openalex.org/I686019"],"apc_list":null,"apc_paid":null,"fwci":0.28,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65079911,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"575","last_page":"579"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8121398687362671},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.8066866993904114},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6477777361869812},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6113395690917969},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5624306797981262},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.546191930770874},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5238102674484253},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4431193470954895},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17485684156417847},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07189694046974182}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8121398687362671},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.8066866993904114},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6477777361869812},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6113395690917969},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5624306797981262},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.546191930770874},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5238102674484253},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4431193470954895},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17485684156417847},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07189694046974182},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsp.2019.8768885","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp.2019.8768885","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1501711229","https://openalex.org/W1584308190","https://openalex.org/W1905280421","https://openalex.org/W2004902747","https://openalex.org/W2062401262","https://openalex.org/W2073089243","https://openalex.org/W2075798023","https://openalex.org/W2078220749","https://openalex.org/W2147024424","https://openalex.org/W2614904885","https://openalex.org/W2728768174","https://openalex.org/W2766427037"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W2802581102","https://openalex.org/W1585007175"],"abstract_inverted_index":{"This":[0],"paper":[1],"is":[2],"focused":[3,56],"on":[4,57],"evaluating":[5],"the":[6,21,42,50,63,68,71,92],"applicability":[7],"of":[8,52,70],"statistical":[9],"machine":[10],"learning":[11,59],"methods":[12,64,95],"to":[13,49,79],"identifying":[14],"flows":[15,100],"and":[16],"user":[17],"behavior":[18],"patterns":[19],"at":[20],"source":[22],"(client)":[23],"network":[24,39],"edge.":[25],"The":[26,82],"research":[27,84],"was":[28],"conducted":[29],"in":[30,87,99],"a":[31],"mid-size":[32],"(covering":[33],"ca":[34],"150":[35],"geographically":[36],"scattered":[37],"locations)":[38],"developed":[40],"for":[41],"Malopolska":[43],"Educational":[44],"Cloud":[45],"(MEC)":[46],"project.":[47],"Due":[48],"lack":[51],"validation":[53],"sets":[54],"we":[55],"unsupervised":[58],"methods.":[60],"Modules":[61],"implementing":[62],"were":[65,75],"fed":[66],"with":[67],"headers":[69],"user-generated":[72],"packets;":[73],"payloads":[74],"not":[76],"analyzed":[77],"due":[78],"privacy":[80],"concerns.":[81],"presented":[83],"proved":[85],"that":[86],"client":[88],"edge":[89],"networks":[90],"even":[91],"simple":[93],"classification":[94],"yield":[96],"satisfactory":[97],"results":[98],"classification.":[101]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
