Identifying Mobile Applications for Encrypted Network Traffic.
Gaofeng HeBingfeng XuHaiting ZhuPublished in: CBD (2017)
Keyphrases
- network traffic
- mobile applications
- mobile devices
- intrusion detection
- mobile phone
- anomaly detection
- computer networks
- traffic analysis
- context aware
- user experience
- traffic data
- mobile users
- network traffic data
- network resources
- network bandwidth
- network intrusion detection
- smart phones
- mobile environments
- intrusion detection system
- internet traffic
- traffic patterns
- network management
- mobile technologies
- mobile apps
- m learning
- routing algorithm
- detecting anomalous
- end users
- long range dependence
- location based services
- wireless technologies
- energy consumption
- data processing
- supervised learning