Pin it! Improving Android network security at runtime.
Damjan BuhovMarkus HuberGeorg MerzdovnikEdgar R. WeipplPublished in: Networking (2016)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- network traffic
- dos attacks
- risk assessment
- network intrusion
- information security
- computer security
- situation assessment
- anomaly detection
- ip networks
- security protection
- security breaches
- anti phishing
- security policies
- network administrators
- mobile devices
- network intrusion detection
- network monitoring
- data management
- denial of service
- active learning
- network attacks
- end hosts
- feature selection
- learning algorithm