Nabil Seddigh

According to our database1, Nabil Seddigh authored at least 32 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Encrypted Mobile Instant Messaging Traffic Dataset.
Dataset, May, 2023

On the Fence: Anomaly Detection in IoT Networks.
Proceedings of the NOMS 2023, 2023

Instant Messaging Application Encrypted Traffic Generation System.
Proceedings of the NOMS 2023, 2023

Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones.
Proceedings of the NOMS 2023, 2023

Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Anomaly Detection for IoT Networks: Empirical Study.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2023

2021
Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors.
J. Netw. Syst. Manag., 2021

2019
A Framework & System for Classification of Encrypted Network Traffic using Machine Learning.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2017
Enhancing Suricata intrusion detection system for cyber security in SCADA networks.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2015
IPCA for network anomaly detection.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Iterative-tuning support vector machine for network traffic classification.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection.
Int. J. Mob. Comput. Multim. Commun., 2014

Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Entropy-based robust PCA for communication network anomaly detection.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Combining SPF and source routing for an efficient probing solution in IPv6 topology discovery.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

2013
Classifying P2P activity in Netflow records: A case study on BitTorrent.
Proceedings of IEEE International Conference on Communications, 2013

Studies in applying PCA and wavelet algorithms for network traffic anomaly detection.
Proceedings of the IEEE 14th International Conference on High Performance Switching and Routing, 2013

Classification of applications in HTTP tunnels.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013

Network traffic anomaly detection using clustering techniques and performance comparison.
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013

2010
Security advances and challenges in 4G wireless networks.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2006
Experimental evaluation of network security through a hierarchical quantitative metrics model.
Proceedings of the Third IASTED International Conference on Communication, 2006

Improving Network Infrastructure Security using Geospatial Technology.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2004
Current Trends and Advances in Information Assurance Metrics.
Proceedings of the Second Annual Conference on Privacy, 2004

2002
BECN for congestion control in TCP/IP networks: study and comparative evaluation.
Proceedings of the Global Telecommunications Conference, 2002

2001
Studies of TCP's retransmission timeout mechanism.
Proceedings of the IEEE International Conference on Communications, 2001

Using TCP models to understand bandwidth assurance in a Differentiated Services network.
Proceedings of the Global Telecommunications Conference, 2001

2000
A Time Sliding Window Three Colour Marker (TSWTCM).
RFC, June, 2000

Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks.
Proceedings of the NETWORKING 2000, 2000

An Empirical Study of Today's Internet Traffic for Differentiated Services IP QoS.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

Empirical study of buffer management scheme for Diffserv assured forwarding PHB.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
Performance Evaluation of Explicit Congestion Notification (ECN) in IP networks.
Proceedings of the MIS '99, 1999

1998
A Connectionless Approach to Providing QoS in IP Networks.
Proceedings of the High Performance Networking, 1998


  Loading...