<?xml version="1.0" encoding="UTF-8"?>
<collection>
<dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:invenio="http://invenio-software.org/elements/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>doi:10.1016/j.knosys.2026.115893</dc:identifier><dc:language>eng</dc:language><dc:creator>Mehavilla, Lorena</dc:creator><dc:creator>García, José</dc:creator><dc:creator>Alesanco, Álvaro</dc:creator><dc:title>Unveiling user activities on instant messaging platforms: A study of activity fingerprinting through traffic analysis and machine learning techniques</dc:title><dc:identifier>ART-2026-148928</dc:identifier><dc:description>Encrypted instant messaging (IM) traffic conceals message content but still exposes communication patterns that can reveal user behaviour. This paper presents a unified framework for inferring user activities across multiple IM platforms by analysing encrypted traffic using machine learning techniques. The proposed approach integrates empirical traffic characterisation, transaction-centric segmentation, and lightweight classifiers to detect user actions, such as sending or receiving text and multimedia messages, in real time. Using Zeek as the core analysis engine, the framework performs packet inspection, transaction segmentation, connection classification, and feature extraction. The framework was evaluated on traffic from nine major IM platforms (Discord, Facebook Messenger, Instagram, Snapchat, Microsoft Teams, Telegram, WeChat, WhatsApp, and X), achieving F1 scores ranging from 0.62 for X up to 0.98 for WhatsApp. Unlike prior studies limited to single applications or synthetic datasets, our work employs realistic, user-driven traffic and explicitly distinguishes message type and direction, improving comparison and cross-platform generalization. Beyond methodological advancements, this study exposes privacy risks inherent in encrypted communication and outlines ethical safeguards and countermeasures to mitigate activity fingerprinting. The findings demonstrate that accurate, real-time inference of encrypted messaging activities is feasible under responsible, consent-based conditions, offering valuable insights for network forensics and privacy-aware communication design.</dc:description><dc:date>2026</dc:date><dc:source>http://zaguan.unizar.es/record/170444</dc:source><dc:doi>10.1016/j.knosys.2026.115893</dc:doi><dc:identifier>http://zaguan.unizar.es/record/170444</dc:identifier><dc:identifier>oai:zaguan.unizar.es:170444</dc:identifier><dc:relation>info:eu-repo/grantAgreement/ES/DGA/T31-20R</dc:relation><dc:relation>info:eu-repo/grantAgreement/ES/MICIU/PID2022-136476OB-I00</dc:relation><dc:identifier.citation>KNOWLEDGE-BASED SYSTEMS 342 (2026), 115893 [17 pp.]</dc:identifier.citation><dc:rights>by</dc:rights><dc:rights>https://creativecommons.org/licenses/by/4.0/deed.es</dc:rights><dc:rights>info:eu-repo/semantics/openAccess</dc:rights></dc:dc>

</collection>