Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic.
Alanoud SubahiGeorge TheodorakopoulosPublished in: Sensors (2019)
Keyphrases
- user behavior
- sensitive information
- user experience
- third party
- social networking
- privacy preserving
- cloud computing
- user interaction
- user preferences
- privacy preservation
- individual user
- user actions
- original data
- user behavior patterns
- data privacy
- click models
- privacy protection
- website
- user browsing
- user interface
- web usage mining
- personal information
- sensitive data
- browsing behavior
- confidential information
- mobile applications
- protect sensitive