Back to Results
First PageMeta Content
Network address translation / Computer network security / TCP/IP stack fingerprinting / IPv4 / IP address / Private network / Transmission Control Protocol / Network protocols / Network architecture / Internet / Computing


2014 IEEE Security and Privacy Workshops Can we identify NAT behavior by analyzing Traffic Flows? YaseminGokcen
Add to Reading List

Document Date: 2014-04-30 03:11:08


Open Document

File Size: 402,34 KB

Share Result on Facebook

City

New York / Rome / Atlanta / Okayama / /

Company

Residential Broadband Networks / ACM Press / WEKA Data Mining Software / Microsoft / /

Country

Italy / United States / Canada / /

/

Facility

M. Hall / /

IndustryTerm

Internet Service Providers / open source tool / well known statistical learning algorithms / web browsers / web browser / opaque solution / local area networks / web browser working / web access log / web access log files / network address translation devices / private network / web browser information / his/her web browser / theirprivate Internet Protocol / proxy server / Internet Protocol / mining / web server / Internet measurment / Internet Explorer / learning algorithms / /

OperatingSystem

Unix / Mac OS X / MacOS / Windows 7 / Linux / Android / L3 / OpenBSD / FreeBSD / Windows XP / Windows 2000 / Microsoft Windows / Windows NT / Windows 95 / Microsoft Vista / /

Organization

Faculty of Computer Science Dalhousie University Halifax / Computational Intelligence for Security and Defense Applications / YaseminGokcen VahidAghaeiForoushani A. NurZincir-Heywood Faculty of Computer Science Dalhousie University Halifax / Centre for Security Science / DR FPR / Government of Canada / Natural Sciences and Engineering Research Council of Canada / /

Person

Naive Bayes / Morgan Kaufmann / FPR TABLE VII / /

Position

probability model / representative / probabilistic model / /

Product

Eq / iPads / calculated using Eq / /

ProgrammingLanguage

Java / ML / /

ProvinceOrState

New York / Nova Scotia / Georgia / /

PublishedMedium

Machine Learning / /

Technology

Unix / Linux / smart phones / MAC address / two learning algorithms / machine learning / Android / Operating System / UDP / well known statistical learning algorithms / operating systems / DSL / TCP/IP / Uniform Resource Locator / mobile devices / encryption / theirprivate Internet Protocol / DNS / Java / proxy server / Naive Bayesian algorithm / Naïve Bayes learning algorithms / smartphones / network address translation / ISP / HTTP / NAT router / IPv4 / C4.5 algorithm / local area networks / web server / 132 Control Protocol/ Internet Protocol / /

URL

http /

SocialTag