Login / Signup

On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis.

Trey ReeceSupreeth SathyanarayanaWilliam H. RobinsonRaheem A. Beyah
Published in: IEEE Trans. Multi Scale Comput. Syst. (2017)
Keyphrases
  • traffic analysis
  • network security
  • network traffic
  • internet traffic
  • traffic data
  • computer networks
  • mobile devices
  • anomaly detection
  • intrusion detection
  • databases
  • social networks