Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Background: Transcriptional modules (TM) consist of groups of co-regulated genes and transcription factors (TF) regulating their expression. Two high-throughput (HT) experimental ...
Xiangdong Liu, Walter J. Jessen, Siva Sivaganesan,...