Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Jingjing RenAshwin RaoMartina LindorferArnaud LegoutDavid R. ChoffnesPublished in: MobiSys (Companion Volume) (2016)
Keyphrases
- network traffic
- intrusion detection
- anomaly detection
- computer networks
- network management
- internet traffic
- network bandwidth
- intrusion detection system
- network security
- mobile applications
- mobile devices
- traffic data
- network monitoring
- mobile phone
- network intrusion detection
- traffic volume
- mobile computing
- mobile environments
- network resources
- mobile users
- mobile objects
- network traffic data
- machine learning
- traffic analysis
- detecting anomalous
- wireless networks
- context aware