Forensic Artifacts of Network Traffic on WeChat Calls.
Da-Yu KaoTing-Chi WangFu-Ching TsaiPublished in: ICACT (2020)
Keyphrases
- network traffic
- intrusion detection
- anomaly detection
- computer networks
- intrusion detection system
- network monitoring
- traffic volume
- network management
- network bandwidth
- network traffic data
- network security
- traffic data
- internet traffic
- network intrusion detection
- traffic analysis
- long range dependence
- network resources
- detecting anomalous
- knowledge discovery
- traffic patterns
- pairwise
- object recognition
- malicious traffic
- training data