The analysis of the network traffic in 5G networks is of high significance to the network security administrator, since it could allow for the identification of different behavioural groups and the distinction of anomalous from normal activity. The problem is the multi-dimensional nature of the data, e.g. SMS, call, Internet, services etc. that makes it difficult to analyse. This is even more challenging in 5G networks, compared to previous generation networks, since one more dimension is added to the traffic, representing different network slices. In this respect, activity that is normal in one slice can be anomalous in another. This paper presents a graph-based method for network mining and visualization of user activities in a mobile net...
Abstract—The visualization of complex network traffic in-volving a large number of communication dev...
Data analytics is regarded as an important function of 5G networks. The Network Data Analytics Funct...
Traditional statistical analysis of network data is often employed to determine traffic distribution...
Nowadays, organization networks are facing an increased number of different attacks and existing int...
This thesis collects the research works I pursued as Ph.D. candidate at the Universitat Politecnica ...
Abstract With the popularization of smartphones, they have become the main target of malicious appli...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
The upcoming fifth-generation (5G) mobile technology, which includes advanced communication features...
As smartphones and mobile devices are becoming ubiquitous and mobile applications increasingly use t...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Fog and mobile edge computing (MEC) will play a key role in the upcoming fifth generation (5G) mobil...
5G and Beyond 5G systems are built with unprecedented scale, heterogeneity and programmability in mi...
Cybersecurity defense systems have evolved, in fact, new intrusion detection systems (IDS) allows to...
Network traffic analysis, and specifically anomaly and attack detection, call for sophisticated tool...
Among the smart capabilities promised by the next generation cellular networks (5G and beyond), it i...
Abstract—The visualization of complex network traffic in-volving a large number of communication dev...
Data analytics is regarded as an important function of 5G networks. The Network Data Analytics Funct...
Traditional statistical analysis of network data is often employed to determine traffic distribution...
Nowadays, organization networks are facing an increased number of different attacks and existing int...
This thesis collects the research works I pursued as Ph.D. candidate at the Universitat Politecnica ...
Abstract With the popularization of smartphones, they have become the main target of malicious appli...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
The upcoming fifth-generation (5G) mobile technology, which includes advanced communication features...
As smartphones and mobile devices are becoming ubiquitous and mobile applications increasingly use t...
Today enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Fog and mobile edge computing (MEC) will play a key role in the upcoming fifth generation (5G) mobil...
5G and Beyond 5G systems are built with unprecedented scale, heterogeneity and programmability in mi...
Cybersecurity defense systems have evolved, in fact, new intrusion detection systems (IDS) allows to...
Network traffic analysis, and specifically anomaly and attack detection, call for sophisticated tool...
Among the smart capabilities promised by the next generation cellular networks (5G and beyond), it i...
Abstract—The visualization of complex network traffic in-volving a large number of communication dev...
Data analytics is regarded as an important function of 5G networks. The Network Data Analytics Funct...
Traditional statistical analysis of network data is often employed to determine traffic distribution...