Login / Signup
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
Xin Su
Xuchong Liu
Jiuchuan Lin
Shiming He
Zhangjie Fu
Wenjia Li
Published in:
KSII Trans. Internet Inf. Syst. (2017)
Keyphrases
</>
malicious activities
website
mobile devices
data mining
online social networks
identity theft
data mining techniques
frequent patterns
interesting patterns
security issues
data streams
knowledge discovery
intrusion detection system