Login / Signup

Identification of Smartphone Applications by Encrypted Traffic Analysis.

Anan SawabeTakanori IwaiKozo Satoda
Published in: CCNC (2019)
Keyphrases
  • traffic analysis
  • network security
  • network traffic
  • traffic data
  • internet traffic
  • mobile devices
  • databases
  • real world
  • machine learning