Login / Signup
A survey on analyzing encrypted network traffic of mobile devices.
Ankit Agrawal
Ashutosh Bhatia
Ayush Bahuguna
Kamlesh Tiwari
K. Haribabu
Deepak Vishwakarma
Rekha Kaushik
Published in:
Int. J. Inf. Sec. (2022)
Keyphrases
</>
network traffic
mobile devices
intrusion detection
anomaly detection
computer networks
network security
traffic volume
traffic data
mobile phone
intrusion detection system
network management
context aware
traffic patterns
internet traffic
network monitoring
traffic analysis
network traffic data
long range dependence
network intrusion detection
network resources
location based services
network bandwidth
metadata
detecting anomalous
information systems
wireless sensor networks