The increased use of video conferencing applications (VCAs) has made it
...
In real-time videos, resending any packets, especially in networks with ...
Since 2006, Turkmenistan has been listed as one of the few Internet enem...
Accurate and efficient network traffic classification is important for m...
The proliferation of global censorship has led to the development of a
p...
Users face various privacy risks in smart homes, yet there are limited w...
The emerging video applications greatly increase the demand in network
b...
Across many real-time video applications, we see a growing need (especia...
In 2021, the Coordinated Science Laboratory CSL, an Interdisciplinary
Re...
Unencrypted DNS traffic between users and DNS resolvers can lead to priv...
Recent developments to encrypt the Domain Name System (DNS) have resulte...
Consumers, regulators, and ISPs all use client-based "speed tests" to me...
Analysis techniques are critical for gaining insight into network traffi...
Although the Internet continues to grow, it increasingly depends on a sm...
Operational networks commonly rely on machine learning models for many t...
Video conferencing applications (VCAs) have become a critical Internet
a...
This paper uses two commercial datasets of IP addresses from smartphones...
Insecure Internet of things (IoT) devices pose significant threats to
cr...
How can society understand and hold accountable complex human and algori...
The COVID-19 pandemic has resulted in dramatic changes to the daily habi...
In this paper, we explore how different representations of network traff...
Conventional detection and classification ("fingerprinting") problems
in...
Until recently, DNS traffic was unencrypted, leaving users vulnerable to...
Data representation plays a critical role in the performance of novelty
...
In this paper, we develop a method to create a large, labeled dataset of...
Online disinformation is a serious and growing sociotechnical problem th...
Despite their name and stated goal, Virtual Private Networks (VPNs) ofte...
Nearly all Internet services rely on the Domain Name System (DNS) to res...
Internet-connected "smart home" IoT devices have rapidly increased in
po...
Many Internet of Things (IoT) devices have voice user interfaces (VUIs)....
In a previous article for S P magazine, we made a case for the new
int...
The proliferation of smart home devices has created new opportunities fo...
Essentially all Internet communication relies on the Domain Name System
...
Government organizations, regulators, consumers, Internet service provid...
Increased concern about data privacy has prompted new and updated data
p...
We consider the problem of regulating products with negative externaliti...
Accurately monitoring application performance is becoming more important...
The proliferation of smart home Internet of Things (IoT) devices present...
In this paper, we demonstrate the effectiveness of using the theory of
c...
The number and variety of Internet-connected devices have grown enormous...
Onion services are anonymous network services that are exposed over the ...
Internet censorship measurements rely on lists of websites to be tested,...
Internet censorship measurements rely on lists of websites to be tested,...
Every Internet communication typically involves a Domain Name System (DN...
The proliferation of Internet of Things (IoT) devices for consumer "smar...
This paper investigates the security and privacy of Internet-connected
c...
Data encryption is the primary method of protecting the privacy of consu...
An increasing number of Internet of Things (IoT) devices are connecting ...
This paper introduces a method to capture network traffic from medical I...
Modern data-center applications frequently exhibit one-to-many communica...