How to Discover IoT Devices When Network Traffic Is Encrypted.
Enriquillo ValdezDimitrios PendarakisHani JamjoomPublished in: ICIOT (2019)
Keyphrases
- network traffic
- intrusion detection
- anomaly detection
- computer networks
- network management
- management system
- network security
- mobile devices
- detect anomalies
- intrusion detection system
- network monitoring
- network bandwidth
- network traffic data
- traffic analysis
- internet traffic
- network intrusion detection
- detecting anomalous
- traffic data
- traffic patterns
- traffic volume
- mobile computing
- network resources
- long range dependence
- navigation systems