Uncovering the footprints of malicious traffic in wireless/mobile networks.
Arun RaghuramuParth H. PathakHui ZangJinyoung HanChang LiuChen-Nee ChuahPublished in: Comput. Commun. (2016)
Keyphrases
- mobile networks
- malicious traffic
- wireless networks
- mobile users
- network traffic
- mobile devices
- detection mechanism
- base station
- ad hoc networks
- mobile ad hoc networks
- ip networks
- cellular networks
- mobile nodes
- traffic patterns
- multimedia content
- routing problem
- wifi
- wireless communication
- anomaly detection
- normal traffic