Using network traffic to verify mobile device forensic artifacts.
Nikunj MalikJayanarayan ChandramouliPrahlad SureshKevin D. FairbanksLanier A. WatkinsWilliam H. RobinsonPublished in: CCNC (2017)
Keyphrases
- network traffic
- mobile devices
- intrusion detection
- anomaly detection
- network security
- computer networks
- traffic data
- traffic analysis
- traffic volume
- network monitoring
- context aware
- network resources
- internet traffic
- network management
- network bandwidth
- intrusion detection system
- traffic patterns
- mobile phone
- malicious code
- network intrusion detection
- detecting anomalous
- normal traffic
- mobile users
- real world
- mobile applications
- data processing
- peer to peer
- object recognition