Login / Signup
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
Euijin Choo
Mohamed Nabeel
Mashael Alsabah
Issa Khalil
Ting Yu
Wei Wang
Published in:
CoRR (2019)
Keyphrases
</>
traffic analysis
mobile devices
network security
internet traffic
network traffic
traffic data
ip addresses
random walk
mobile learning
graph mining
traffic flow
remote server
bayesian networks
computer networks
directed graph
expectation maximization
mobile phone
peer to peer
scheduling problem