ReCon: Revealing and Controlling Privacy Leaks in Mobile Network Traffic.
Jingjing RenAshwin RaoMartina LindorferArnaud LegoutDavid R. ChoffnesPublished in: CoRR (2015)
Keyphrases
- network traffic
- private information
- intrusion detection
- anomaly detection
- privacy preserving
- computer networks
- intrusion detection system
- personal information
- network monitoring
- network intrusion detection
- network security
- mobile devices
- network resources
- network management
- network traffic data
- traffic analysis
- mobile applications
- context aware
- mobile phone
- network bandwidth
- internet traffic
- mobile users
- traffic data
- mobile networks
- traffic patterns
- normal traffic
- data mining
- long range dependence