{"id":"https://openalex.org/W6907538663","doi":"https://doi.org/10.21227/maj9-vh13","title":"MIRAGE: Mobile-app Traffic Capture and Ground-truth Creation","display_name":"MIRAGE: Mobile-app Traffic Capture and Ground-truth Creation","publication_year":2019,"publication_date":"2019-10-07","ids":{"openalex":"https://openalex.org/W6907538663","doi":"https://doi.org/10.21227/maj9-vh13"},"language":"en","primary_location":{"id":"doi:10.21227/maj9-vh13","is_oa":true,"landing_page_url":"https://doi.org/10.21227/maj9-vh13","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/maj9-vh13","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Aceto, Giuseppe","orcid":"https://orcid.org/0000-0002-4445-6259"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aceto, Giuseppe","raw_affiliation_strings":["University of Napoli Federico II"],"affiliations":[{"raw_affiliation_string":"University of Napoli Federico II","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ciuonzo, Domenico","orcid":"https://orcid.org/0000-0002-6230-2958"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ciuonzo, Domenico","raw_affiliation_strings":["University of Napoli Federico II"],"affiliations":[{"raw_affiliation_string":"University of Napoli Federico II","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Montieri, Antonio","orcid":"https://orcid.org/0000-0003-4340-442X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Montieri, Antonio","raw_affiliation_strings":["University of Napoli Federico II"],"affiliations":[{"raw_affiliation_string":"University of Napoli Federico II","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Persico, Valerio","orcid":"https://orcid.org/0000-0003-4340-442X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Persico, Valerio","raw_affiliation_strings":["University of Napoli Federico II"],"affiliations":[{"raw_affiliation_string":"University of Napoli Federico II","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Pescap\u00e8, Antonio","orcid":"https://orcid.org/0000-0002-0221-7444"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pescap\u00e8, Antonio","raw_affiliation_strings":["University of Napoli Federico II"],"affiliations":[{"raw_affiliation_string":"University of Napoli Federico II","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5717999935150146},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5295000076293945},{"id":"https://openalex.org/keywords/enabling","display_name":"Enabling","score":0.4765999913215637},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.4650999903678894},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4553000032901764},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4462999999523163},{"id":"https://openalex.org/keywords/floating-car-data","display_name":"Floating car data","score":0.4368000030517578},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.4171999990940094}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6353999972343445},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5717999935150146},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5295000076293945},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48089998960494995},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.4765999913215637},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.4650999903678894},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4553000032901764},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4462999999523163},{"id":"https://openalex.org/C64093975","wikidata":"https://www.wikidata.org/wiki/Q356677","display_name":"Floating car data","level":3,"score":0.4368000030517578},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.4171999990940094},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.41190001368522644},{"id":"https://openalex.org/C78834623","wikidata":"https://www.wikidata.org/wiki/Q640394","display_name":"Mobile broadband","level":3,"score":0.40529999136924744},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.4025999903678894},{"id":"https://openalex.org/C94168897","wikidata":"https://www.wikidata.org/wiki/Q574324","display_name":"Network traffic simulation","level":4,"score":0.39430001378059387},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.3767000138759613},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.3677999973297119},{"id":"https://openalex.org/C36800599","wikidata":"https://www.wikidata.org/wiki/Q915808","display_name":"Public land mobile network","level":4,"score":0.36230000853538513},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.3560999929904938},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.3249000012874603},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2621999979019165}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/maj9-vh13","is_oa":true,"landing_page_url":"https://doi.org/10.21227/maj9-vh13","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/maj9-vh13","is_oa":true,"landing_page_url":"https://doi.org/10.21227/maj9-vh13","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Network":[0],"traffic":[1,46,61,94,111,126,143],"analysis,":[2],"i.e.":[3],"the":[4,15,24,42,79,117,121,134],"umbrella":[5],"of":[6,45,101,119],"procedures":[7],"for":[8,17,26,92,109,137],"distilling":[9],"information":[10],"from":[11],"network":[12,29],"traffic,":[13],"represents":[14],"enabler":[16],"highly-valuable":[18],"profiling":[19],"information,":[20],"other":[21],"than":[22],"being":[23,36],"workhorse":[25],"several":[27],"key":[28],"management":[30],"tasks.":[31],"While":[32],"it":[33],"is":[34,104,128],"currently":[35],"revolutionized":[37],"in":[38,123],"its":[39],"nature":[40],"by":[41,48,133],"rising":[43],"share":[44],"generated":[47],"mobile":[49,110,124,142],"and":[50,63,75,86,96],"hand-held":[51],"devices,":[52],"existing":[53],"design":[54],"solutions":[55],"are":[56,69],"mainly":[57],"evaluated":[58],"on":[59,78],"private":[60],"traces,":[62],"only":[64],"a":[65,89,106],"few":[66],"public":[67],"datasets":[68],"available,":[70],"thus":[71],"clearly":[72],"limiting":[73],"repeatability":[74],"further":[76],"advances":[77],"topic.To":[80],"this":[81,102],"end,":[82],"we":[83],"have":[84],"designed":[85],"implemented":[87],"MIRAGE,":[88],"reproducible":[90],"architecture":[91],"mobile-app":[93],"capture":[95],"ground-truth":[97],"creation.":[98],"The":[99],"outcome":[100],"system":[103],"MIRAGE-2019,":[105],"human-generated":[107],"dataset":[108],"analysis":[112],"(with":[113],"associated":[114],"ground-truth)":[115],"having":[116],"goal":[118],"advancing":[120],"state-of-the-art":[122],"app":[125],"analysis.MIRAGE-2019":[127],"expected":[129],"to":[130,141],"be":[131],"capitalized":[132],"networking":[135],"community":[136],"different":[138],"tasks":[139],"related":[140],"analysis.":[144]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
