DOI: 10.22215/etd/2020-14171
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted Network Traffic Classification using Ensemble Learning Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
1
1
0
Order By: Relevance
“…Another study [47] was utilized the RF classifier and scored an accuracy of 0.893, Recall 0.890, F1 score of 0.896, and precision of 0.92. In [45] The results of this paper are also equivalent and sometimes above the results of [48,49]. One can conclude that the results of the current study are supported by other studies, however, with slight variations in some parameters.…”
Section: G Discussionsupporting
confidence: 86%
“…Another study [47] was utilized the RF classifier and scored an accuracy of 0.893, Recall 0.890, F1 score of 0.896, and precision of 0.92. In [45] The results of this paper are also equivalent and sometimes above the results of [48,49]. One can conclude that the results of the current study are supported by other studies, however, with slight variations in some parameters.…”
Section: G Discussionsupporting
confidence: 86%
“…Network traffic data are generated daily from various computer devices and applications connected to the internet. For example, traffic data could be contributed by users' web browsing activities, e-mails, chats, streams, file transfers, voice-over internet protocol (IP), and peer-to-peer applications [1]. These data can be captured and analysed using network or packet analysis tools.…”
Section: Introductionmentioning
confidence: 99%