{"id":"https://openalex.org/W2169659938","doi":"https://doi.org/10.1145/1998412.1998425","title":"Inferring users' online activities through traffic analysis","display_name":"Inferring users' online activities through traffic analysis","publication_year":2011,"publication_date":"2011-06-14","ids":{"openalex":"https://openalex.org/W2169659938","doi":"https://doi.org/10.1145/1998412.1998425","mag":"2169659938"},"language":"en","primary_location":{"id":"doi:10.1145/1998412.1998425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1998412.1998425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM conference on Wireless network security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115604720","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-7985-8541"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["University of Nebraska-Lincoln, Lincoln, NE, USA"],"affiliations":[{"raw_affiliation_string":"University of Nebraska-Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665461","display_name":"Wenbo He","orcid":"https://orcid.org/0000-0001-8606-2920"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenbo He","raw_affiliation_strings":["University of Nebraska-Lincoln, Lincoln, NE, USA"],"affiliations":[{"raw_affiliation_string":"University of Nebraska-Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100372152","display_name":"Xue Liu","orcid":"https://orcid.org/0000-0001-5252-3442"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xue Liu","raw_affiliation_strings":["McGill University, Montreal, PQ, Canada"],"affiliations":[{"raw_affiliation_string":"McGill University, Montreal, PQ, Canada","institution_ids":["https://openalex.org/I5023651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052769561","display_name":"Patrick G. Bridges","orcid":"https://orcid.org/0000-0003-4801-0390"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick G. Bridges","raw_affiliation_strings":["University of New Mexico, Albuquerque, NM, USA"],"affiliations":[{"raw_affiliation_string":"University of New Mexico, Albuquerque, NM, USA","institution_ids":["https://openalex.org/I169521973"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115604720"],"corresponding_institution_ids":["https://openalex.org/I114395901"],"apc_list":null,"apc_paid":null,"fwci":10.1595,"has_fulltext":false,"cited_by_count":96,"citation_normalized_percentile":{"value":0.98200066,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.8840291500091553},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8295358419418335},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7986938953399658},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7160369157791138},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.6554003953933716},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.5133811235427856},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.45439958572387695},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43451520800590515},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4296887516975403},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4190386235713959},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3904842436313629},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3576233983039856},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.302840918302536},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2302965521812439},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11201432347297668}],"concepts":[{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.8840291500091553},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8295358419418335},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7986938953399658},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7160369157791138},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.6554003953933716},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.5133811235427856},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.45439958572387695},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43451520800590515},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4296887516975403},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4190386235713959},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3904842436313629},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3576233983039856},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.302840918302536},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2302965521812439},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11201432347297668}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1998412.1998425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1998412.1998425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM conference on Wireless network security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W105475431","https://openalex.org/W1608222975","https://openalex.org/W1916902331","https://openalex.org/W1955645522","https://openalex.org/W1988251340","https://openalex.org/W1993028889","https://openalex.org/W2011628134","https://openalex.org/W2012095206","https://openalex.org/W2048702750","https://openalex.org/W2051552208","https://openalex.org/W2073089243","https://openalex.org/W2087405576","https://openalex.org/W2095691935","https://openalex.org/W2096118443","https://openalex.org/W2108217512","https://openalex.org/W2116762892","https://openalex.org/W2119271160","https://openalex.org/W2122226347","https://openalex.org/W2130598205","https://openalex.org/W2133473417","https://openalex.org/W2134632326","https://openalex.org/W2135088779","https://openalex.org/W2144098589","https://openalex.org/W2144411949","https://openalex.org/W2145498707","https://openalex.org/W2147124620","https://openalex.org/W2147593671","https://openalex.org/W2148728861","https://openalex.org/W2150779517","https://openalex.org/W2160543135","https://openalex.org/W2167139585","https://openalex.org/W2167266744","https://openalex.org/W2172000360","https://openalex.org/W3138273970","https://openalex.org/W3150719513","https://openalex.org/W3160447194","https://openalex.org/W4236506014","https://openalex.org/W4255738146","https://openalex.org/W4285719527","https://openalex.org/W4290757805"],"related_works":["https://openalex.org/W4387918499","https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W2368710903","https://openalex.org/W2208749249","https://openalex.org/W3166874438","https://openalex.org/W4289314221","https://openalex.org/W4206366499","https://openalex.org/W2188471597","https://openalex.org/W3121070838"],"abstract_inverted_index":{"Traffic":[0],"analysis":[1,37],"may":[2],"threaten":[3],"user":[4,84],"privacy,":[5],"even":[6],"if":[7,143],"the":[8,39,114,117,131,144],"traffic":[9,36],"is":[10,42,85],"encrypted.":[11],"In":[12],"this":[13],"paper,":[14],"we":[15,55,91],"use":[16],"IEEE":[17],"802.11":[18],"wireless":[19],"local":[20],"area":[21],"networks":[22],"(WLANs)":[23],"as":[24],"an":[25],"example":[26],"to":[27,80,112],"show":[28,121],"that":[29,122],"inferring":[30],"users'":[31],"online":[32,53,61,128],"activities":[33,54],"accurately":[34],"by":[35],"without":[38],"administrator's":[40],"privilege":[41],"possible":[43],"during":[44],"very":[45],"short":[46],"periods":[47],"(e.g.,":[48,98],"a":[49,71,83],"few":[50],"seconds).":[51],"The":[52],"investigated":[56],"include":[57],"web":[58],"browsing,":[59],"chatting,":[60],"gaming,":[62],"downloading,":[63],"uploading":[64],"and":[65,104,139],"video":[66],"watching,":[67],"etc.":[68],"We":[69],"implement":[70],"hierarchical":[72],"classification":[73,118],"system":[74,124],"based":[75],"on":[76,87,101,130],"machine":[77],"learning":[78],"algorithms":[79],"discover":[81],"what":[82],"doing":[86],"his/her":[88],"computer.":[89],"Furthermore,":[90],"conduct":[92],"experiments":[93],"in":[94,105,136],"different":[95,109,127],"network":[96],"environments":[97],"at":[99],"home,":[100],"university":[102],"campus,":[103],"public":[106],"areas)":[107],"with":[108],"application":[110],"scenarios":[111],"evaluate":[113],"performance":[115],"of":[116,133],"system.":[119],"Results":[120],"our":[123],"can":[125],"distinguish":[126],"applications":[129],"accuracy":[132,142],"about":[134],"80%":[135],"5":[137],"seconds":[138],"over":[140],"90%":[141],"eavesdropping":[145],"lasts":[146],"for":[147],"1":[148],"minute.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":7}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
