Login / Signup
Analyzing Android Encrypted Network Traffic to Identify User Actions.
Mauro Conti
Luigi Vincenzo Mancini
Riccardo Spolaor
Nino Vincenzo Verde
Published in:
IEEE Trans. Inf. Forensics Secur. (2016)
Keyphrases
</>
network traffic
user actions
intrusion detection
anomaly detection
user behavior
intrusion detection system
user feedback
network intrusion detection
traffic data
user model
mobile devices
user interaction
data processing
active learning
information retrieval
information seeking
metadata