{"id":"https://openalex.org/W2560709733","doi":"https://doi.org/10.1109/wincom.2016.7777201","title":"Enhanced traffic classification design through a randomized approach for more secure 3G mobile networks","display_name":"Enhanced traffic classification design through a randomized approach for more secure 3G mobile networks","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2560709733","doi":"https://doi.org/10.1109/wincom.2016.7777201","mag":"2560709733"},"language":"en","primary_location":{"id":"doi:10.1109/wincom.2016.7777201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom.2016.7777201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078031133","display_name":"Raja Ettiane","orcid":"https://orcid.org/0000-0003-2226-5889"},"institutions":[{"id":"https://openalex.org/I4210153527","display_name":"Institut National des Postes et T\u00e9l\u00e9communications","ror":"https://ror.org/052bnvt46","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210153527","https://openalex.org/I4210167103"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Raja Ettiane","raw_affiliation_strings":["MUSICS, National Institute of Posts and Telecommunication (INPT), Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"MUSICS, National Institute of Posts and Telecommunication (INPT), Rabat, Morocco","institution_ids":["https://openalex.org/I4210153527"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035865866","display_name":"Abdelaali Chaoub","orcid":"https://orcid.org/0000-0002-2323-1800"},"institutions":[{"id":"https://openalex.org/I4210153527","display_name":"Institut National des Postes et T\u00e9l\u00e9communications","ror":"https://ror.org/052bnvt46","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210153527","https://openalex.org/I4210167103"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdelaali Chaoub","raw_affiliation_strings":["MUSICS, National Institute of Posts and Telecommunication (INPT), Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"MUSICS, National Institute of Posts and Telecommunication (INPT), Rabat, Morocco","institution_ids":["https://openalex.org/I4210153527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064459432","display_name":"Rachid Elkouch","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153527","display_name":"Institut National des Postes et T\u00e9l\u00e9communications","ror":"https://ror.org/052bnvt46","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210153527","https://openalex.org/I4210167103"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Rachid Elkouch","raw_affiliation_strings":["MUSICS, National Institute of Posts and Telecommunication (INPT), Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"MUSICS, National Institute of Posts and Telecommunication (INPT), Rabat, Morocco","institution_ids":["https://openalex.org/I4210153527"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078031133"],"corresponding_institution_ids":["https://openalex.org/I4210153527"],"apc_list":null,"apc_paid":null,"fwci":0.8569,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.84692902,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"116","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7568961977958679},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.656715452671051},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5969974994659424},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.565474271774292},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5259856581687927},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47667956352233887},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4742664098739624},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.462205171585083},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.46108976006507874},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.41306784749031067},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3910906910896301},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1429087519645691},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12977781891822815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7568961977958679},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.656715452671051},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5969974994659424},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.565474271774292},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5259856581687927},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47667956352233887},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4742664098739624},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.462205171585083},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.46108976006507874},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.41306784749031067},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3910906910896301},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1429087519645691},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12977781891822815},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom.2016.7777201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom.2016.7777201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1549979217","https://openalex.org/W1998451262","https://openalex.org/W2014825211","https://openalex.org/W2028249711","https://openalex.org/W2033442522","https://openalex.org/W2039568132","https://openalex.org/W2064969374","https://openalex.org/W2081318579","https://openalex.org/W2124806945","https://openalex.org/W2137740704","https://openalex.org/W3101581741"],"related_works":["https://openalex.org/W2165912799","https://openalex.org/W2735662278","https://openalex.org/W2382615723","https://openalex.org/W2029232111","https://openalex.org/W2159422359","https://openalex.org/W2335680976","https://openalex.org/W2294196761","https://openalex.org/W2141929741","https://openalex.org/W2252345849","https://openalex.org/W2786117496"],"abstract_inverted_index":{"Nowadays,":[0],"billions":[1],"of":[2,17,39,77],"users":[3],"are":[4],"connected":[5],"to":[6,37,73,103,141],"the":[7,10,49,75,94,104,108,129],"internet":[8],"through":[9],"3G":[11],"mobile":[12],"infrastructure":[13],"offering":[14],"a":[15,25,69,112],"plethora":[16],"emerging":[18],"services.":[19],"This":[20,43],"explosion":[21],"is":[22,90],"associated":[23],"with":[24,68],"heavy":[26],"and":[27,55,97,137],"complex":[28],"signaling":[29,45,53,79,130],"among":[30,107],"different":[31],"network":[32],"elements":[33],"making":[34],"them":[35],"vulnerable":[36],"denial":[38],"service":[40],"(DoS)":[41],"attacks.":[42,57],"significant":[44],"overhead":[46],"makes":[47],"difficult":[48],"differentiation":[50],"between":[51],"normal":[52,136],"messages":[54],"malicious":[56,138],"In":[58],"this":[59],"paper,":[60],"we":[61,116],"propose":[62],"an":[63,83],"enhanced":[64,120],"randomization":[65,121],"technique":[66],"jointly":[67],"traffic":[70,125,131],"categorization":[71],"approach":[72],"mitigate":[74],"impact":[76],"DoS":[78],"attacks":[80],"while":[81,143],"maintaining":[82],"optimal":[84],"resource":[85,145],"allocation.":[86],"The":[87],"proposed":[88],"solution":[89],"fully":[91],"applicable":[92],"for":[93],"third":[95],"generation":[96],"its":[98],"successors":[99],"as":[100],"well,":[101],"due":[102],"many":[105],"similarities":[106],"control":[109],"plane.":[110],"Using":[111],"synthetic":[113],"traces":[114],"simulator,":[115],"prove":[117],"that":[118],"our":[119],"mechanism":[122],"based":[123],"on":[124],"classification":[126],"reduces":[127],"markedly":[128],"volume":[132],"emerged":[133],"from":[134],"both":[135],"activities":[139],"up":[140],"40%":[142],"keeping":[144],"consumption":[146],"at":[147],"very":[148],"reasonable":[149],"levels.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
