C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
Xin Su
Xuchong Liu
Jiuchuan Lin
Shiming He
Zhangjie Fu
Wenjia Li
Published in:
KSII Trans. Internet Inf. Syst. (2017)
Keyphrases
</>
malicious activities
website
mobile devices
data mining
online social networks
identity theft
data mining techniques
frequent patterns
interesting patterns
security issues
data streams
knowledge discovery
intrusion detection system