Review Topical Sections

A systematic review of foreign language learning with immersive technologies (2001-2020)

  • This study provides a systematic literature review of research (2001–2020) in the field of teaching and learning a foreign language and intercultural learning using immersive technologies. Based on 2507 sources, 54 articles were selected according to a predefined selection criteria. The review is aimed at providing information about which immersive interventions are being used for foreign language learning and teaching and where potential research gaps exist. The papers were analyzed and coded according to the following categories: (1) investigation form and education level, (2) degree of immersion, and technology used, (3) predictors, and (4) criterions. The review identified key research findings relating the use of immersive technologies for learning and teaching a foreign language and intercultural learning at cognitive, affective, and conative levels. The findings revealed research gaps in the area of teachers as a target group, and virtual reality (VR) as a fully immersive intervention form. Furthermore, the studies reviewed rarely examined behavior, and implicit measurements related to inter- and trans-cultural learning and teaching. Inter- and transcultural learning and teaching especially is an underrepresented investigation subject. Finally, concrete suggestions for future research are given. The systematic review contributes to the challenge of interdisciplinary cooperation between pedagogy, foreign language didactics, and Human-Computer Interaction to achieve innovative teaching-learning formats and a successful digital transformation.

    Citation: Rebecca M. Hein, Carolin Wienrich, Marc E. Latoschik. A systematic review of foreign language learning with immersive technologies (2001-2020)[J]. AIMS Electronics and Electrical Engineering, 2021, 5(2): 117-145. doi: 10.3934/electreng.2021007

    Related Papers:

    [1] Faiz Ul Islam, Guangjie Liu, Weiwei Liu . Identifying VoIP traffic in VPN tunnel via Flow Spatio-Temporal Features. Mathematical Biosciences and Engineering, 2020, 17(5): 4747-4772. doi: 10.3934/mbe.2020260
    [2] Xiaolin Gui, Yuanlong Cao, Ilsun You, Lejun Ji, Yong Luo, Zhenzhen Luo . A Survey of techniques for fine-grained web traffic identification and classification. Mathematical Biosciences and Engineering, 2022, 19(3): 2996-3021. doi: 10.3934/mbe.2022138
    [3] Jin Wang, Liping Wang, Ruiqing Wang . MFFLR-DDoS: An encrypted LR-DDoS attack detection method based on multi-granularity feature fusions in SDN. Mathematical Biosciences and Engineering, 2024, 21(3): 4187-4209. doi: 10.3934/mbe.2024185
    [4] Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Aaisha Makkar . Advancements in enhancing cyber-physical system security: Practical deep learning solutions for network traffic classification and integration with security technologies. Mathematical Biosciences and Engineering, 2024, 21(1): 1527-1553. doi: 10.3934/mbe.2024066
    [5] Zilong Liu, Jingbing Li, Jing Liu . Encrypted face recognition algorithm based on Ridgelet-DCT transform and THM chaos. Mathematical Biosciences and Engineering, 2022, 19(2): 1373-1387. doi: 10.3934/mbe.2022063
    [6] Chenhao Wu, Lei Chen . A model with deep analysis on a large drug network for drug classification. Mathematical Biosciences and Engineering, 2023, 20(1): 383-401. doi: 10.3934/mbe.2023018
    [7] Kaimeng Chen, Chin-Chen Chang . High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting. Mathematical Biosciences and Engineering, 2019, 16(5): 3947-3964. doi: 10.3934/mbe.2019195
    [8] Shufen Niu, Wei Liu, Sen Yan, Qi Liu . Message sharing scheme based on edge computing in IoV. Mathematical Biosciences and Engineering, 2023, 20(12): 20809-20827. doi: 10.3934/mbe.2023921
    [9] Yiqin Bao, Qiang Zhao, Jie Sun, Wenbin Xu, Hongbing Lu . An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission. Mathematical Biosciences and Engineering, 2024, 21(1): 96-115. doi: 10.3934/mbe.2024005
    [10] Chunkai Zhang, Ao Yin, Wei Zuo, Yingyang Chen . Privacy preserving anomaly detection based on local density estimation. Mathematical Biosciences and Engineering, 2020, 17(4): 3478-3497. doi: 10.3934/mbe.2020196
  • This study provides a systematic literature review of research (2001–2020) in the field of teaching and learning a foreign language and intercultural learning using immersive technologies. Based on 2507 sources, 54 articles were selected according to a predefined selection criteria. The review is aimed at providing information about which immersive interventions are being used for foreign language learning and teaching and where potential research gaps exist. The papers were analyzed and coded according to the following categories: (1) investigation form and education level, (2) degree of immersion, and technology used, (3) predictors, and (4) criterions. The review identified key research findings relating the use of immersive technologies for learning and teaching a foreign language and intercultural learning at cognitive, affective, and conative levels. The findings revealed research gaps in the area of teachers as a target group, and virtual reality (VR) as a fully immersive intervention form. Furthermore, the studies reviewed rarely examined behavior, and implicit measurements related to inter- and trans-cultural learning and teaching. Inter- and transcultural learning and teaching especially is an underrepresented investigation subject. Finally, concrete suggestions for future research are given. The systematic review contributes to the challenge of interdisciplinary cooperation between pedagogy, foreign language didactics, and Human-Computer Interaction to achieve innovative teaching-learning formats and a successful digital transformation.



    Various studies are being conducted on privacy protection in the field of computer communication [1,2,3]. It is known that when plaintext is transmitted without encryption, it can be eavesdropped on and intercepted. Hence, encrypted communication protocols are being used to protect privacy by encrypting transmission data. In 2017, Gartner predicted that more than 80% of web traffic can be encrypted [4]. According to the statistics reported as of August 2022, more than 80% of web pages were loaded as Hypertext Transfer Protocol Secure (HTTPS) over Transport Layer Security (TLS) protocols [5].

    Encryption communication protocols protect transmission data using encryption algorithms. Clients and servers negotiate the encryption methods and share encryption keys before transmitting the data. After the negotiation, the data are encrypted and transmitted. This method ensures that the confidentiality of the data is maintained by making it impossible to know the content, even if a third- party attempts to eavesdrop and intercept the data. However, encryption communication protocols can be used for malicious purposes, thus posing cybersecurity issues. Cisco expected that by 2021, more than 70% of web malware would encrypt traffic, whereas 60% of organizations would fail to detect web malware traffic [6].

    Attackers threaten cybersecurity by exploiting the fact that third parties are incapable of accessing the contents of transmission data when encryption communication protocols are used, as shown in Figure 1.

    Figure 1.  Example of encrypted traffic abuse by malicious applications.

    In general, the network security equipment is installed in the actual network path or replicates communication packets during traffic inspection. However, the data being transmitted cannot be decrypted if the traffic is encrypted. Therefore, the network security equipment cannot check the contents and take necessary steps based on analyses. Hence, attackers exploit the limited visibility of network security equipment to conduct cyberattacks such as leakage of internal information assets or sending of triggers to malicious codes to penetrate the internal network. It is, therefore, difficult to specify the attempt and scope of the attacks that use encrypted traffic, posing a significant threat.

    To manage the risk of encryption communication protocol abuse, decryption must be performed to ensure the visibility of encrypted traffic data and for performing inspections. However, decrypting data for inspection risks privacy infringement while incurring additional computing resources and decryption time. In addition, the time delay between the client and server due to decryption and inspection increases, which can reduce the quality of the user experience. To overcome these disadvantages, it is necessary to classify and analyze the encrypted traffic without using a decryption process. To this end, network fingerprinting technology is one of the most promising candidates.

    Traditional network fingerprinting techniques have been used to perform OS identification using header information in the TCP/IP stack or identify network topology using IP address information [7]. The procedure depends on the existing network environment configuration, on-premises server, and network configuration. However, with the advent of modern cloud computing and software-defined network technologies, network fingerprinting is expected to be less effective as the boundaries of the network become blurred and the configuration of services that are not dependent on traditional network address schemes increases. In addition, traffic-type classifiers utilizing traditional network fingerprinting operate based on the TCP/IP packet length [8]. The padding of encryption algorithms used in cryptographic communication protocols is expected to act as noise obstructing the input of traffic-type classifiers, thus reducing classifier accuracy. TLS fingerprinting is emerging as a method to compensate for these shortcomings.

    TLS fingerprinting uses the handshake and header information of the TLS stack and encrypted application data to identify client applications and web servers and identify and classify the types of content sent. Instead of relying on IP addresses, it generates fingerprints by extracting specific information (such as encryption algorithm chutes and extensions) characterized by a TLS handshake. It also targets encrypted packets to extract features and generate classifiers to respond to encrypted traffic. This technology can be used alone and in conjunction with technology and other network fingerprinting technologies in the existing TCP/IP stack to improve accuracy. Cybersecurity, therefore, requires a broad understanding of TLS fingerprinting to respond to changing networks.

    This study provides a broad overview of encrypted network traffic fingerprinting techniques that analyze encrypted traffic without decryption. Fingerprinting is used to classify and identify client applications or servers. Fingerprints are generated through non-encrypted data from cryptographic negotiation (handshake) messages. They are then compared against fingerprint databases, or machine learning, artificial intelligence (AI), and statistical techniques are applied to a large number of datasets to generate identifiers and classifiers.

    The contributions of this study are divided into two categories. First, encrypted network traffic fingerprinting techniques are investigated, and several fingerprint generation and accuracy improvement methods are described. Second, the investigation results are analyzed by organizing the identifier and classifier generation techniques. They are categorized and described based on the method and features used for identification and classification. Lastly, journals, conferences, research papers, and internet documents are surveyed. The findings are classified and described using the taxonomy shown in Figure 2.

    Figure 2.  Taxonomy for encrypted network traffic fingerprinting.

    The manuscript consists of six sections. Section 2 explains the background information required for understanding the fingerprinting techniques. Section 3 describes encrypted traffic fingerprint techniques and studies based on them. Section 4 discusses identifier and classifier generation techniques. The last section concludes the paper by presenting the results and future scope of the current research.

    Our work provides extensive information on TLS fingerprinting gained through investigation and analysis. Prior to the investigation of detailed techniques, we discuss them in relation to a survey study of techniques targeting encrypted traffic [9,10,11,12]. Survey studies have been performed for classification [9,10], detection [12], and analysis [11] as problem domains. Among them, Refs. [9,10,11] focus on techniques using machine learning. In addition, we refer to relevant studies [13,14,15,16] for explanations of techniques using privacy, graph networks, time series data, etc., discussed in the paper. We summarize the related survey papers below, with Table 1 providing a comparison of the problem domains, methods, and protocols of the survey papers described.

    Table 1.  Comparison of present study with various related literature.
    Survey Problem domains Method Protocols
    [9] Classification Focus on ML-based Various
    [10] Classification ML-based Various
    [11] Detection Focus on ML-based TLS
    [12] Analysis Various Various
    Present study Fingerprinting Various TLS

     | Show Table
    DownLoad: CSV

    Velan et al. [9] discussed classification and analysis techniques for Internet Protocol Security, TLS, Secure Shell Protocol, BitTorrent, and Skype protocol traffic. The classification technique divided the information extraction steps into non-encrypted initialization steps and the encrypted data transfer steps into payload- and feature-based methods. Payload-based methods include techniques that perform pattern matching on payload, which is the transmission of data or operations based on information such as the payload size, port number, and IP address that can be obtained from packets without processing. Feature-based methods extract features from encrypted communication patterns and utilize maps, unsupervised methods, hybrid machine learning, and basic statistical analysis. Pacheco et al. [10] presented a study that systematically described techniques using machine learning for the classification of encrypted network traffic. Basic machine learning required for traffic classification and the representative workflows of traffic classification techniques using machine learning are discussed. Based on the workflow, an overview of the data collection, feature engineering, algorithm selection, and model deployment methods by category is provided.

    Oh et al. [11] discussed methods used for analyzing malicious network traffic encrypted with TLS available at the Security Operation Center. Machine-learning-based algorithms and encryption traffic analysis techniques using middleboxes were mainly described. An overview of how TLS interception can be performed over middlebox without a secret key or through a machine learning pipeline, for passive inspection of TLS-encrypted traffic to perform analysis by sniffing traffic and extracting features or performing malware detection using TLS flow fingerprinting was provided.

    Papadogiannaki and Ioannidis [12] described cryptographic network analysis applications, technologies, and countermeasures in four use cases. These use cases consist of analytics, security, user privacy, and middleboxes. Analytics identifies protocols and users, security detects malicious traffic, user privacy detects data leakage and fingerprinting, and middlebox performs a deep packet inspection for man-in-the-middle attacks. Each case provides an overview of the application, technology, and response measures adopted. The datasets used in each study are also mentioned.

    However, the researchers did not specify or describe TLS fingerprinting, which can be utilized additionally or alone in the technology stack of network fingerprinting. Existing survey papers on TLS fingerprinting provide only partial information on its use as a cryptographic traffic analysis technique, insufficient for a broad understanding of TLS fingerprinting. This paper aims to provide a broad perspective on TLS fingerprinting techniques without being specific to the purpose, technique, or data type.

    TLS is an encryption communication protocol designed to prevent eavesdropping, tampering, and message forgery of client-server data by providing end-to-end encryption. TLS 1.0, based on Secure Socket Layer (SSL) 3.0, achieved communication privacy over the internet [17]. When TLS 1.3 was announced in March 2021, TLS 1.0 and TLS 1.1 were discontinued by the Internet Engineering Task Force (IETF) [18]. Transmission data are protected by authenticating servers and clients using a certificate and public key (asymmetric key) algorithms and performing encryption algorithm negotiation and key exchange for transmission data encryption to encrypt data after negotiation [19,20,21,22]. The TLS structure is illustrated in Figure 3. It protects the data transmitted from application layer protocols (HTTP and FTP) to transport layer protocols (TCP and UDP payload). Traffic between communication peers is protected through record protocols, and handshakes sharing encryption specifications and keys for transmission data protection are conducted.

    Figure 3.  TLS structure.

    Key exchange, server parameter setting, and authentication are the three stages of a handshake, as shown in Figure 4. The Client/ServerHello messages sent during the key exchange phase are not encrypted. A handshake encryption key is shared to protect the messages during this phase. The handshake encryption key is used until an application encryption key is shared in the server parameters and authentication phases. The application data are encrypted using N number of application encryption keys generated through key sharing. The Client/ServerHello messages, which are non-encrypted data, are used to generate fingerprints using cipher suites and extensions.

    Figure 4.  Basic full TLS handshake.

    A Markov chain is a stochastic probability model with a Markov property in which the probability of a particular event depends only on the state attained in the previous event [23]. A stochastic process is a set of probability variables whose state changes stochastically over a certain period. It can be termed as a collection of values that observe the state of an object over time. The probability process can be categorized into discrete and continuous time depending on the time of observation. A Markov chain generally refers to the discrete-time Markov process [24]. If Xn+1 is a specific state and Xn is a historical state, then the Markov chain can be expressed as

    limxa+f(x)=±P(Xn+1=j|Xn=i,Xn1=in1,,X0=i0)=P(Xn+1=j|Xn=i). (1)

    If P(Xn+1=j|Xn=i), which is a pair of (i,j), is expressed as pij, then a Markov chain with m states can be encoded as in Eq (2). The matrix is a two-dimensional transition probability matrix, where i, j,and pij represent the row, column, and transition probability elements of the matrix. Since the sum of all elements in each row is the sum of the probabilities of transition to a particular state, it is always 1.

    (p11p1mpm1pmm) (2)

    A Markov chain can also be represented by a state transition graph using a set of states and a transition probability matrix. For example, Figure 5 illustrates a Markov chain with m=2 and pij=4

    Figure 5.  Example of state transition graph for a Markov chain.

    Markov processes and chains are mathematical techniques for analyzing state changes and state characteristics by approaching complex probability processes with simple assumptions using a set of states and transition probability matrices [25,26]. The state transition graph of a Markov chain can be used to generate fingerprints based on changes in the message type and state of encrypted communication traffic.

    AI is a field of study based on the speculation that machines can be used to simulate all aspects of learning and other features of intelligence with accuracy as its principle [27]. AI, which aims to simulate intelligent human behavior, is widely used in the field of data engineering, power demand forecasting, etc. [28]. It aims for an accurate prediction in the form of machine learning systems.

    Machine learning extracts features from a large number of data and then learns them into artificial neural networks to perform classification and regression on future inputs [29]. With the development of deep learning techniques that combine human neural networks with deep neural networks, research in various fields and use cases have emerged [30]. It is used to analyze encrypted traffic, such as extracting features from encrypted communication traffic, classifying positive/malicious software traffic, or identifying client applications and services.

    A technique based on fingerprint collection generates fingerprints for encrypted traffic, stores them in a database, and performs fingerprinting by complete or approximate matching. Fingerprints are generated based on Client/ServerHello messages, statistical techniques, and behavior such as responding to a request message from a particular sequence. They are represented by strings, data formats (XML, JSON), state transition graphs, etc. Fingerprints that are forged, altered, or unregistered have the disadvantage of poor accuracy, as the technique relies on fingerprint information. Research on improving accuracy using statistics and AI techniques is being conducted.

    This technique generates fingerprints by extracting values from ClientHello/ServerHello and messages sent and received during the key exchange phase. It is primarily a technique that identifies the processes of a client and the services provided by a server and compares them to a prebuilt fingerprint database used for fingerprinting.

    Ristic [31] proposed a technique that distinguished client processes, taking advantage of the fact that the list of supported encryption algorithms on the server differed depending on the client using the SSL. Subsequently, several studies have proposed fingerprint generation methods using various ClientHello fields based on cipher suits [32,33,34,35]. The fields used are presented in Table 2.

    Table 2.  Comparison of fingerprinting technique based on ClientHello field.
    ClientHello field [31] [32] [33] [34] [35]
    SSL/TLS record version
    SSL/TLS version
    Cipher suites length
    Cipher suites
    Extensions
    Data of extensions
    Flag
    Compression length
    Compression
    Server name*
    Elliptic curves*
    Elliptic curve point formats*

     | Show Table
    DownLoad: CSV

    Cipher suites are commonly used for fingerprinting while extensions are used with SSL fingerprinting for p0f [32]. Brotherston [33] presented a demonstration of identifying real-world processes by adding various fields. Althouse [34] discussed JA3 fingerprint, which uses extension and elliptic curve algorithm information for fingerprint generation to simplify the use field and for discrimination. Fingerprint generation codes and methods were shared as open sources to broaden the base. JA3 fingerprint is also used as pulse information in Open Threat Exchange, a threat intelligence-sharing system. An example of a JA3 fingerprint obtained using the ClientHello message is shown in Figure 6. The network flow data capturing and aliasing package named Joy by Cisco uses TLS fingerprints [35]. Similar to the JA3 fingerprint, these fingerprints do not extract the contents of a specific extension for fingerprint usage, but the data of the extension can be included in the fingerprint. Although this technique has the advantages of fast identification speed and ease of use, fingerprints are generated only in the ClientHello messages. Therefore, the technique has a disadvantage in that several processes using the same ClientHello messages may belong to one fingerprint.

    Figure 6.  Example of JA3 fingerprint using ClientHello message.

    Accuracy can be improved by utilizing additional techniques, such as machine learning, statistical techniques, and usage of ServerHello information, to compensate for the shortcomings. This is done because the ClientHello of the client may remain the same but the ServerHello of the servers, which are connected, may differ for different applications. JA3S uses ServerHello to generate server fingerprints, while Joy uses the cipher suit selected by the server [35,36]. JA3S with JA3 fingerprints provides additional information on connections. Thus, a classification between connections with ClientHello may be performed. Joy allows the classification between connections, but it uses different fingerprinting information such as different protocols and Operating Systems.

    To improve ClientHello/ServerHello-based techniques, Anderson and McGrew [37] used knowledge bases combined with end host and network data to identify the direction of trends in enterprise TLS applications. It also enhanced the understanding of application behavior. Anderson and McGrew [38] presented a method to improve the identification and classification accuracy of ClientHello-based TLS fingerprints using destination context and pre-collected knowledge bases. For this study, a similar fingerprint group was selected through approximate matching, using the Levenshtein distance algorithm, when no exact match for the fingerprint information was found. The matching probability was then computed using the weighted naive Bayes model learned with the destination context and knowledge bases. The process was identified as most likely.

    Korczynésk and Duda [39] collected all handshake connections that occurred when accessing a particular service (Paypal, Twitter, Dropbox, etc.). Probabilities for the TLS protocol versions and the handshake message occurrences were derived and classified as Markov chains with parameters. Liu et al. [40] generated features by using length Markov models in addition to message-type Markov models [39]. Classification using machine-learning-based classifiers was performed. Liu et al. [41] proposed a method to improve the classification accuracy of application traffic by performing fingerprinting using cipher suite distribution as multi-attributions in addition to the length Markov models [40]. Classification accuracy was derived for applications such as MaMPF and improved accuracy was demonstrated [40]. An example of a statistical fingerprint obtained using a Markov chain and state transition graph is shown in Figure 7.

    Figure 7.  Example of the statistical fingerprint using a Markov chain and state transition graph.

    Chao [42] conducted a study to identify malicious encrypted traffic. The fingerprint was generated by adding a TCP handshake, SSL/TLS message type, and TCP four-way wave as fingerprint elements to the SSL/TLS handshake state transition-based fingerprint [39]. Encrypted traffic was also identified by generating a feature based on a 2-order Markov chain derived from the generated fingerprint and utilizing it for machine learning.

    Zhao et al. [43] classified and identified encrypted traffic by replicating and analyzing traffic characteristics for pre-filtered traffic with header and handshake. Fingerprints based on a hidden Markov model were extracted to classify and identify applications. For this study, classification was performed on web applications, Real-time transport protocol, voice over internet protocol, and video-audio streaming media traffic.

    In 2019, Garn et al. [44] identified a web browser, during a client application, by sending a test set consisting of a specific combination of sequences from the server during the TLS handshake process. When the browser sends a ClientHello message to the server, the server, configured with the proposed framework, sends a specific combination of server-response messages. The browser transmits a response message to the server message. During this handshake process, the browser fingerprints the message sent by the client as a feature vector. In 2022, Garn et al. [45] discussed a two-step method for identifying a browser, and the ClientHello-based fingerprinting was performed while connecting to the browser. The browser was identified using the old method when no unique matching results were found [44]. An example of a behavioral fingerprint using a combination of sequences is shown in Figure 8.

    Figure 8.  Example of behavioral fingerprint using a combination of sequences.

    AI-based techniques extract features from encrypted traffic and learn artificial neural networks to perform fingerprinting. Feature extraction utilizes statistical, time series, graph, and hybrid (or miscellaneous) techniques. Statistical analysis extracts features using statistical techniques on data obtained from the traffic, while the time series technique extracts feature through meaningful information arranged in chronological order among data obtained from the traffic. A graph extracts feature using a traffic-tracking graph. A hybrid technique uses several complex techniques and other features. In particular, the technique can identify the transmitted content and the algorithm used for encrypting transmission data.

    In 2017, Dubin et al. [46] proposed a method using machine learning for extracting features from video streaming traffic and for classifying the video titles uploaded to video platforms. The bit-per-peak feature, derived from the peak value in the download speed pattern during video streaming, is used. The video content transmitted through encrypted traffic was classified by a third party. Yang et al. [47] proposed a method specifying which images were viewed on performing fingerprinting with Markov chain for fragments of encrypted video traffic in addition to the previous method [46]. The state change diagram of the fragment sequence, modeled for video streaming with a specific title for the video, was uploaded as a Markov chain on YouTube, a video platform operator. Thereafter, the title of the image, viewed through the machine learning model learned with the modeled information, was a YouTube image.

    Al-Naami et al. [48] extracted the burst size and time of length, downlink, and uplink from the header of the packet and configured a feature set called bi-directional dependent fingerprinting to study the machine learning model by performing a two-way application on a mobile website.

    In 2021, Kanda and Hashimoto [49] proposed a technique for identifying encryption algorithms and libraries on encrypted payloads to compensate for the shortcomings of randomizing or modifying the handshake message parameters to bypass TLS fingerprinting. Based on the test features of NIST SP 800-22 "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, " features were extracted, and the TLS version, cipher suite, and encryption algorithm were predicted [50]. An example of AI-based behavioral fingerprinting using statistical features is shown in Figure 9.

    Figure 9.  Example of AI-based fingerprinting using statistical-based features.

    Böttinger et al. [51] used the length of The TLS record protocol as a feature to train a machine learning model to generate a classifier. The classifier classified the file format to be transmitted. The Classification was performed on application (ELF), voice (MP3), document (PDF), and image (JPG, WEBM) format files. In real scenarios, it was reported that fragment offset, uncertain compressor state, and symmetric block cipher padding acted as noise.

    Zhang et al. [52] proposed features that could be used in techniques for fingerprinting websites encrypted with SSL/TLS and applied the features to a Deep Forest model. The proposed local request and response sequence feature was a value derived by grouping the size and packet number of in/outgoing packets according to various criteria. The developed model was then compared with other models and f1 score.

    Lu et al. [53] used traffic-tracking graphs to fingerprint websites. The traffic-tracking graph was generated by dividing a packet into flows, by referring to a collection of packets with the same IP, and by using the packet length, time interval, directional sequence, and timestamp of the first packet. Subsequently, website classification was performed using the proposed graph-based machine learning model. A system overview of the graph attention pooling network-website fingerprinting (GAP-WF) is shown in Figure 10.

    Figure 10.  System overview of the GAP-WF [53].

    Richter et al. [54] presented four methods using HMAC size changes based on the selected cipher suite and TLS fragmentation. Five application layer protocols (namely, Hypertext Transfer Protocol, Simple Mail Transfer Protocol, Internet Relay Chat, Post Office Protocol3, and Internet Message Access Protocol) using Bayesian classifiers were classified. The TLS fragmentation, analyzed traffic structures, packet length, and inter-arrival time used as features are shown in Figure 11. Each method was made unique by using different feature extractions.

    Figure 11.  Differences in the use of TLS fragmentation and network traffic statistics by methods [54].

    Anderson et al. [55,56,57] attempted to increase the accuracy of malware classification using various features. A dataset with a TLS version, offered cipher suits, TLS extension, selected cipher suite, client key length, sequence of record length, time, and type as features were constructed, and malware detection was performed [55]. Malicious traffic can be classified using a sequence of packet lengths (SPLTs), time, byte distribution (BD), with TLS, HTTP, and DNS metadata as features [56]. In the case of metadata for each protocol, data were extracted from the TLS handshake message, HTTP header, and DNS response without decryption. Malware detection was performed by learning the L1-logistic regression model. Malicious traffic can also be classified using SPLT, BD, and TLS metadata, and a custom feature server certificate was self-signed [57].

    Based on the techniques discussed so far, a step-by-step TLS fingerprinting technique is presented in Figure 12.

    Figure 12.  Future work of encrypted network traffic fingerprinting.

    First, in encrypted traffic fingerprinting, the TLS packet between the client and server is analyzed and executed. If the packet to be analyzed is classified by time, it can be divided into the key exchange, server parameter and authentication, and application data phases, which are termed Phase 1, 2, and 3, respectively, for convenience. Phase 1 is understood as a connection establishment attempt phase, Phase 2 is understood as a connection establishment phase, and Phase 3 is understood as a connected phase.

    In Phase 1, pre-connection analysis is performed based on the Client/ServerHello fingerprints. In Phase 2, analysis is performed during the connection setup (handshake) using the metadata of the entire handshake phase. In Phase 3, analysis is performed while connected. Phase 1 has the advantage of quick analysis and pre-detection, but it is vulnerable to handshake modulation and is relatively less accurate when the analysis is performed using limited information. Phase 2 needs more information to perform high-accuracy detections and may still be vulnerable to handshake modulation. It has the disadvantage of being incapable of detecting content (e.g., insider information leakage) transmitted after being disconnected. In Phase 3, the information extracted from the application is used to detect the transmitted content based on the connection information that was analyzed until Phase 2.

    Detailed fingerprinting can be performed using a greater number of phases, but a significant time and computing resources are consumed as more information is used. Therefore, applying a step-by-step technology according to the policy will increase the efficiency of the fingerprinting process. For example, the application phases may be configured differently depending on the importance and type of asset. For systems where identification of "who approaches" is important, the client should be analyzed using Phases 1 and 2, and for important assets that can cause serious damage in case of leakage, all three Phases should be used to identify content and detect insider information leakage.

    In this study, encrypted traffic fingerprinting is analyzed by dividing it into fingerprint collection and AI techniques. Several advantages and disadvantages for each technique are identified.

    Fingerprint collection techniques have the advantage of easy system construction when the fingerprint generation methods are clear. In addition, they are identified and classified through a fingerprint database comparison, which consumes less time and computing resources. In these techniques, pre-detection is possible because identification and classification can proceed during the handshake process. However, their accuracy is poor when fingerprints are not registered in the fingerprint database or when the client and server falsify and modulate the information used for fingerprint generation.

    AI can perform calculations using various features and can infer encrypted and transmitted contents along with the encryption algorithms used. This is advantageous because it can identify leaked contents and report whether the information was leaked during detection. However, detection in advance is difficult because it can target the application layer or collect information on the entire connected traffic and then extract features and read the results.

    As shown in Figure 12, a study capable of performing fingerprinting step-by-step should be conducted in the future to offset the advantages and disadvantages of each technique.

    This work was supported by an Institute for Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No.2022-0-01200, Training Key Talents in Industrial Convergence Security).

    The authors declare no conflict of interest.



    [1] Ahn SJ, Bostick J, Ogle E, et al. (2016) Experiencing nature: Embodying animals in immersive virtual environments increases inclusion of nature in self and involvement with nature. Journal of Computer-Mediated Communication 21: 399–419. doi: 10.1111/jcc4.12173
    [2] Banakou D, Groten R, Slater M (2013) Illusory ownership of a virtual child body causes overestimation of object sizes and implicit attitude changes. Proceedings of the National Academy of Sciences 110: 12846–12851. doi: 10.1073/pnas.1306779110
    [3] Barreira J, Bessa M, Pereira LC, et al. (2012) MOW: Augmented Reality game to learn words in different languages: Case study: Learning English names of animals in elementary school. In 7th Iberian conference on information systems and technologies (CISTI 2012). 1–6. IEEE.
    [4] Barrett MD (2011) Intercultural competence. EWC Statement Series 2: 23–27.
    [5] Bazzaza MW, Alzubaidi M, Zemerly MJ, et al. (2016) Impact of smart immersive mobile learning in language literacy education. In 2016 IEEE Global Engineering Education Conference (EDUCON). 443–447. IEEE.
    [6] Berns A, Mota JM, Ruiz-Rube I, et al. (2018) Exploring the potential of a 360 video application for foreign language learning. In Proceedings of the Sixth International Conference on Technological Ecosystems for Enhancing Multiculturality. 776–780.
    [7] Blell G, Doff S (2014) Mehrsprachigkeit und Mehrkulturalität: Einführung in das Thema. Zeitschrift für Interkulturellen Fremdsprachenunterricht 19.
    [8] Bond M, Marín VI, Dolch C, et al. (2018) Digital transformation in German higher education: student and teacher perceptions and usage of digital media. Int J Educ Technol H 15: 1–20. doi: 10.1186/s41239-017-0083-9
    [9] Buhl H, Winter R (2009) Full virtualization – BISE's contribution to a vision. Business and Information Systems Engineering 1: 133–136. doi: 10.1007/s12599-008-0023-2
    [10] Byram M, Doyé P (1999) Intercultural competence and foreign language learning in the primary school. The teaching of modern foreign languages in the primary school, 138–151.
    [11] Chabot S, Drozdal J, Peveler M, et al. (2020) A collaborative, immersive language learning environment using augmented panoramic imagery. In 2020 6th International Conference of the Immersive Learning Research Network (iLRN), 225–229.
    [12] Chang YJ, Chen CH, Huang WT, et al. (2011) Investigating students' perceived satisfaction, behavioral intention, and effectiveness of English learning using augmented reality. In 2011 IEEE International Conference on Multimedia and Expo. 1–6.
    [13] Chen G, Starosta W (1999) A review of the concept of intercultural awareness. Human Communication 2: 27–54.
    [14] Chen CP, Wang CH (2015) The effects of learning style on mobile augmented-reality-facilitated English vocabulary learning. In 2015 2nd International Conference on Information Science and Security (ICISS). 1–4.
    [15] Chen YL (2016) The effects of virtual reality learning environment on student cognitive and linguistic development. The Asia-Pacific Education Researcher 25: 637–646. doi: 10.1007/s40299-016-0293-2
    [16] Chen SY, Hung CY, Chang YC, et al. (2018) A study on integrating augmented reality technology and game-based learning model to improve motivation and effectiveness of learning English vocabulary. In 2018 1st International Cognitive Cities Conference (IC3). 24–27.
    [17] Chen MP, Wang LC, Zou D, et al. (2020) Effects of captions and English proficiency on learning effectiveness, motivation and attitude in augmented-reality-enhanced theme-based contextualized EFL learning. Computer Assisted Language Learning, 1–31.
    [18] Chen MRA, Hwang GJ (2020) Effects of experiencing authentic contexts on English speaking performances, anxiety and motivation of EFL students with different cognitive styles. Interactive Learning Environments, 1–21.
    [19] Chen Y, Smith TJ, York CS, et al. (2020) Google Earth Virtual Reality and expository writing for young English Learners from a Funds of Knowledge perspective. Computer Assisted Language Learning 33: 1–25. doi: 10.1080/09588221.2018.1544151
    [20] Chen CH (2020) AR videos as scaffolding to foster students' learning achievements and motivation in EFL learning. British Journal of Educational Technology 51: 657–672. doi: 10.1111/bjet.12902
    [21] Chew SW, Jhu JY, Chen NS (2018) The effect of learning English idioms using scaffolding strategy through situated learning supported by augmented reality. In 2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT). 390–394.
    [22] Chung LY (2011) Using avatars to enhance active learning: Integration of virtual reality tools into college English curriculum. In The 16th North-East Asia Symposium on Nano, Information Technology and Reliability. 29–33.
    [23] Chung LY (2012) Virtual Reality in college English curriculum: Case study of integrating second life in freshman English course. In 2012 26th International Conference on Advanced Information Networking and Applications Workshops. 250–253.
    [24] Cooper C, Varley-Campbell J, Booth A, et al. (2018) Systematic review identifies six metrics and one method for assessing literature search effectiveness but no consensus on appropriate use. J clin epidemiol 99: 53–63. doi: 10.1016/j.jclinepi.2018.02.025
    [25] Cornillie F, Clarebout G, Desmet P (2012) Between learning and playing? Exploring learners' perceptions of corrective feedback in an immersive game for English pragmatics. ReCALL: Journal of Eurocall 24: 257–278. doi: 10.1017/S0958344012000146
    [26] Dalim CSC, Dey A, Piumsomboon T, et al. (2016) TeachAR: An interactive augmented reality tool for teaching basic English to non-native children. In 2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct). 82–86.
    [27] De Freitas S (2006) Learning in immersive worlds: A review of game-based learning. 2–60.
    [28] De Grove F, Van Looy J, Courtois C (2010) Towards a serious game experience model: Validation, extension and adaptation of the GEQ for use in an educational context. In Playability and player experience. 10: 47–61. Breda University of Applied Sciences.
    [29] Draxler F, Labrie A, Schmidt A, et al. (2020) Augmented reality to enable users in learning case grammar from their real-world interactions. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–12.
    [30] Eisenmann M, Grimm N, Volkmann L (2010) 92. Teaching the new English cultures and literatures. English and American Studies in German 2009: 164–166. doi: 10.1515/9783484431225.164
    [31] Eisenmann M (2019) Teaching English: Differentiation and Individualisation. utb GmbH.
    [32] Fast-Berglund Å, Gong LL (2018) Testing and validating extended reality (xR) technologies in manufacturing. Procedia Manuf 25: 31–38. doi: 10.1016/j.promfg.2018.06.054
    [33] Fernández SS, Pozzo MI (2017) Intercultural competence in synchronous communication between native and non-native speakers of Spanish. Language Learning in Higher Education 7: 109–135. doi: 10.1515/cercles-2017-0003
    [34] Garzon J, Acevedo J (2019) Meta-analysis of the impact of Augmented Reality on students' learning gains. Educational Research Review 27: 244–260. doi: 10.1016/j.edurev.2019.04.001
    [35] Gelsomini M, Leonardi G, Garzotto F (2020) Embodied learning in immersive smart spaces. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.
    [36] Giraudeau P, Olry A, Roo JS, et al. (2019) CARDS: a mixed-reality system for collaborative learning at school. In Proceedings of the 2019 ACM International Conference on Interactive Surfaces and Spaces. 55–64.
    [37] Grünewald A (2016) Üben und Übungen im Fremdsprachenunterricht. Üben und Übungen beim Fremdsprachenlernen: Perspektiven und Konzepte für Unterricht und Forschung. Arbeitspapiere der 36. Frühjahrskonferenz zur Erforschung des Fremdsprachenunterrichts, 84.
    [38] Guillén-Nieto V, Aleson-Carbonell M (2012) Serious games and learning effectiveness: The case of It'sa Deal! Computers and Education 58: 435–448.
    [39] Hamilton D, McKechnie J, Edgerton E (2020) Immersive virtual reality as a pedagogical tool in education: a systematic literature review of quantitative learning outcomes and experimental design. Journal of Computer Education 8: 1–32. doi: 10.1007/s40692-020-00169-2
    [40] Hammer M (2012) The intercultural development inventory: A new frontier in assessment and development of intercultural competence. Sterling, VA: Stylus Publishing. In M. Vande Berg, R. M. Paige, and K. H. Lou (Eds.). Student learning abroad, 115–136.
    [41] Hao KC, Lee LC (2019) The development and evaluation of an educational game integrating augmented reality, ARCS model, and types of games for English experiment learning: an analysis of learning. Interactive Learning Environments, 1–14.
    [42] Hassani K, Nahvi A, Ahmadi A (2016) Design and implementation of an intelligent virtual environment for improving speaking and listening skills. Interactive Learning Environments 24: 252–271. doi: 10.1080/10494820.2013.846265
    [43] He J, Ren J, Zhu G, et al. (2014) Mobile-based AR application helps to promote EFL children's vocabulary study. In 2014 IEEE 14th International Conference on Advanced Learning Technologies. 431–433.
    [44] Herrera F, Bailenson J, Weisz E, et al. (2018) Building long-term empathy: A large-scale comparison of traditional and virtual reality perspective-taking. PLOS ONE 13: e0204494. doi: 10.1371/journal.pone.0204494
    [45] Ho SC, Hsieh SW, Sun PC, et al. (2017) To activate English learning: Listen and speak in real life context with an AR featured u-learning system. Journal of Educational Technology and Society 20: 176–187.
    [46] Hsieh M (2016) Development and evaluation of a mobile AR assisted learning system for English learning. 2016 International Conference on Applied System Innovation (ICASI), Okinawa, 1-4.
    [47] Hsieh MC (2016) Teachers' and students' perceptions toward augmented reality materials. In 2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI). 1180–1181.
    [48] Hsu TC (2019) Effects of gender and different augmented reality learning systems on English vocabulary learning of elementary school students. Universal Access in the Information Society 18: 315–325. doi: 10.1007/s10209-017-0593-1
    [49] Huang X, Han G, He J, et al. (2018) Design and Application of a VR English Learning Game Based on the APT Model. In 2018 Seventh International Conference of Educational Innovation through Technology (EITT). 68–72.
    [50] Hung HC, Young SSC (2015) An investigation of game-embedded handheld devices to enhance English learning. Journal of Educational Computing Research 52: 548–567. doi: 10.1177/0735633115571922
    [51] Ibrahim A, Huynh B, Downey J, et al. (2018) Arbis pictus: A study of vocabulary learning with augmented reality. IEEE T Vis Comput Gr 24: 2867–2874. doi: 10.1109/TVCG.2018.2868568
    [52] Ji S, Li K, Zou L (2019) The Effect of 360-Degree Video Authentic Materials on EFL Learners' Listening Comprehension. In 2019 International Joint Conference on Information, Media and Engineering (IJCIME). 288–293.
    [53] Johnson-Glenberg MC, Birchfield DA, Tolentino L, et al. (2014) Collaborative embodied learning in mixed reality motion-capture environments: Two science studies. Journal of Educational Psychology 106: 86. doi: 10.1037/a0034008
    [54] Khatoony S (2019) An Innovative Teaching with Serious Games through Virtual Reality Assisted Language Learning. In 2019 International Serious Games Symposium (ISGS). 100–108.
    [55] Kincheloe Joe L (2008) Critical Pedagogy Primer 2nd edition. English: New York, NY: Peter Lang.
    [56] Küçük S, Yylmaz RM, Göktap Y (2014) Augmented reality for learning English: Achievement, attitude and cognitive load levels of students. Education and Science/Egitim ve Bilim 39.
    [57] Küster L (2014) Zur Einführung in den Themenschwerpunkt. Fremdsprachen lehren und lernen 43: 2.
    [58] Lan YJ (2015) Contextual EFL learning in a 3D virtual environment. Language Learning and Technology 19: 16–31.
    [59] Lee K, Kweon SO, Lee S, et al. (2014) POSTECH immersive English study (POMY): Dialog-based language learning game. IEICE T Inf Syst 97: 1830–1841. doi: 10.1587/transinf.E97.D.1830
    [60] Lee SM, Park M (2020) Reconceptualization of the context in language learning with a location-based AR app. Computer Assisted Language Learning 33: 936–959. doi: 10.1080/09588221.2019.1602545
    [61] Leyva F, Plummer CJ (2015) National Institute for Health and Care Excellence 2014 guidance on cardiac implantable electronic devices: health economics reloaded.
    [62] Li KC, Tsai CW, Chen CT, et al. (2015) The design of immersive English learning environment using augmented reality. In 2015 8th International Conference on Ubi-Media Computing (UMEDIA). 174-179.
    [63] Liaw ML (2019) EFL learners' intercultural communication in an open social virtual environment. Journal of Educational Technology and Society 22: 38–55.
    [64] Liou HC (2012) The roles of Second Life in a college computer-assisted language learning (CALL) course in Taiwan, ROC. Computer Assisted Language Learning 25: 365–382. doi: 10.1080/09588221.2011.597766
    [65] Liu IF, Chen MC, Sun YS, et al. (2010) Extending the TAM model to explore the factors that affect intention to use an online learning community. Computers and education 54: 600–610. doi: 10.1016/j.compedu.2009.09.009
    [66] Liu E, Liu C, Yang Y, et al. (2018) Design and implementation of an augmented reality application with an English Learning Lesson. In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE) 494–499.
    [67] Lorenzo CM, Lezcano L, Alonso SS (2013) Language Learning in Educational Virtual Worlds-a TAM Based Assessment. J UCS 19: 1615–1637.
    [68] Matveev AV (2002) The perception of intercultural communication competence by American and Russian managers with experience on multicultural teams (Doctoral dissertation, Ohio University).
    [69] Milgram P, Kishino F (1994) A taxonomy of mixed reality visual displays. IEICE T Inf Syst 77: 1321–1329.
    [70] Moher D, Liberati A, Tetzlaff J, et al. (2011) Bevorzugte Report Items für systematische Übersichten und Meta-Analysen: Das PRISMA-Statement. DMW-Deutsche Medizinische Wochenschrift 136: e9–e15. doi: 10.1055/s-0031-1272982
    [71] Neumeier P (2005) A closer look at blended learning–parameters for designing a blended learning environment for language teaching and learning. ReCALL: the Journal of EUROCALL 17: 163. doi: 10.1017/S0958344005000224
    [72] Oberdörfer S, Latoschik ME (2019) Predicting learning effects of computer games using the Gamified Knowledge Encoding Model. Entertain Comput 32: 100315. doi: 10.1016/j.entcom.2019.100315
    [73] Oberdörfer S, Elsässer A, Schraudt D, et al. (2020) Horst-The teaching frog: learning the anatomy of a frog using tangible AR. In Proceedings of the Conference on Mensch und Computer. 303–307.
    [74] Peck T, Seinfeld S, Aglioti S, et al. (2013) Putting yourself in the skin of a black avatar reduces implicit racial bias. Consciousness and cognition 22: 779–787. doi: 10.1016/j.concog.2013.04.016
    [75] Qu C, Ling Y, Heynderickx I, et al. (2015) Virtual bystanders in a language lesson: examining the effect of social evaluation, vicarious experience, cognitive consistency and praising on students' beliefs, self-efficacy and anxiety in a virtual reality environment. PloS one 10: e0125279. doi: 10.1371/journal.pone.0125279
    [76] Quintín E, Sanz C, Zangara A (2016) The impact of role-playing games through Second Life on the oral practice of linguistic and discursive sub-competences in English. In 2016 International Conference on Collaboration Technologies and Systems (CTS). 148–155.
    [77] Ratan R, Beyea D, Li B, et al. (2020) Avatar characteristics induce 'users' behavioral conformity with small-to-medium effect sizes: A meta-analysis of the proteus effect. Media Psychology 23: 651–675. doi: 10.1080/15213269.2019.1623698
    [78] Redondo B, Cózar-Gutiérrez R, González-Calero JA, et al. (2020) Integration of augmented reality in the teaching of English as a foreign language in early childhood education. Early Childhood Education Journal 48: 147–155. doi: 10.1007/s10643-019-00999-5
    [79] Ripka G, Grafe S, Latoschik ME (2020) Preservice Teachers' encounter with Social VR–Exploring Virtual Teaching and Learning Processes in Initial Teacher Education. In SITE Interactive Conference. 549–562. Association for the Advancement of Computing in Education (AACE).
    [80] Sherman WR, Craig AB (2003) Understanding virtual reality. San Francisco, CA: Morgan Kauffman.
    [81] Shih YC, Yang MT (2008) A collaborative virtual environment for situated language learning using VEC3D. Educational Technology and Society 11: 56–68.
    [82] Shih YC (2015) A virtual walk through London: Culture learning through a cultural immersion experience. Computer Assisted Language Learning 28: 407–428. doi: 10.1080/09588221.2013.851703
    [83] Skarbez R, Frederick PB, Mary CW (2018) Immersion and Coherence in a Stressful Virtual Environment. In Proceedings of the 24th Acm Symposium on Virtual Reality Software and Technology. 1–11.
    [84] Slater M, Wilbur S (1997) A framework for immersive virtual environments (FIVE): Speculations on the role of presence in virtual environments. Presence: Teleoperators and Virtual Environments 6: 603–616. doi: 10.1162/pres.1997.6.6.603
    [85] Slater M (1999) Measuring presence: A response to the Witmer and Singer presence questionnaire. Presence 8: 560–565. doi: 10.1162/105474699566477
    [86] Slater M (2003) A note on presence terminology. Presence connect 3: 1–5.
    [87] Sanchez-Vives MV, Mel S (2005) From presence to consciousness through virtual reality. Nat Rev Neurosci 6: 332–339. doi: 10.1038/nrn1651
    [88] Slater M (2009) Place illusion and plausibility can lead to realistic behaviour in immersive virtual environments. Philos T R Soc B 364: 3549–3557. doi: 10.1098/rstb.2009.0138
    [89] Tulodziecki G, Grafe S (2012) Approaches to learning with media and media literacy education–trends and current situation in Germany. Journal of Media Literacy Education 4: 5.
    [90] Tulodziecki G, Grafe S, Herzig B (2019) Medienbildung in Schule und Unterricht: Grundlagen und Beispiele. UTB GmbH.
    [91] Vate-U-Lan P (2012) An augmented reality 3d pop-up book: the development of a multimedia project for English language teaching. In 2012 IEEE International Conference on Multimedia and Expo. 890–895.
    [92] Vedadi S, Abdullah ZB, Cheok AD (2019) The Effects of Multi-Sensory Augmented Reality on Students' Motivation in English Language Learning. In 2019 IEEE Global Engineering Education Conference (EDUCON). 1079–1086.
    [93] Wang CX, Calandra B, Hibbard ST, et al. (2012) Learning effects of an experimental EFL program in Second Life. Educational Technology Research and Development 60: 943–961. doi: 10.1007/s11423-012-9259-0
    [94] Wang YF, Petrina S, Feng F (2017) VILLAGE—V irtual I mmersive L anguage L earning and G aming E nvironment: Immersion and presence. British Journal of Educational Technology 48: 431–450. doi: 10.1111/bjet.12388
    [95] Wienrich C, Johanna G (2020) AppRaiseVR–An Evaluation Framework for Immersive Experiences. I-Com 19: 103–121. doi: 10.1515/icom-2020-0008
    [96] Wienrich C, Döllinger NI, Hein R (2020) Mind the Gap: A Framework (BehaveFIT) Guiding The Use of Immersive Technologies in Behavior Change Processes. arXiv preprint arXiv: 2012.10912.
    [97] Wienrich C, Eisenmann M, Latoschik ME, et al. (2020) CoTeach - Connected Teacher Education. VRinSight Greenpaper 53–55.
    [98] Witmer BG, Singer MJ (1998) Measuring presence in virtual environments: A presence questionnaire. Presence 7: 225–240. doi: 10.1162/105474698565686
    [99] Wohlgenannt I, Simons A, Stieglitz S (2020) Virtual Reality. Business and Information Systems Engineering 5: 455–461. doi: 10.1007/s12599-020-00658-9
    [100] Wu MH (2019) The applications and effects of learning English through augmented reality: A case study of Pokémon go. Computer Assisted Language Learning, 1–35.
    [101] Yang MT, Liao WC (2014) Computer-assisted culture learning in an online augmented reality environment based on free-hand gesture interaction. IEEE T Learn Technol 7: 107–117. doi: 10.1109/TLT.2014.2307297
    [102] Yeh HC, Tseng SS, Heng L (2020) Enhancing EFL students' intracultural learning through virtual reality. Interactive Learning Environments, 1–10.
    [103] Zhang X, Zhou M (2019) Interventions to promote 'learners' intercultural competence: A meta-analysis. International Journal of Intercultural Relations 71: 31–47. doi: 10.1016/j.ijintrel.2019.04.006
  • This article has been cited by:

    1. Yuba R. Siwakoti, Danda B. Rawat, 2024, Detecting Malicious Traffic using JA3 Fingerprints Attributed ML Approach, 979-8-3503-5471-3, 128, 10.1109/ICDCSW63686.2024.00024
    2. Jong Hyuk Park, Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities, 2024, 21, 1551-0018, 7012, 10.3934/mbe.2024307
    3. Zelin Cui, Pu Dong, Dongxu Han, Bo Jiang, Zhigang Lu, Huamin Feng, 2025, Cross Page Recognition Methods for Encrypted Web Application Fingerprinting, 979-8-3315-1305-4, 423, 10.1109/CSCWD64889.2025.11033489
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(10460) PDF downloads(871) Cited by(39)

Figures and Tables

Figures(5)  /  Tables(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog