Using network traffic to verify mobile device forensic artifacts.
Nikunj MalikJayanarayan ChandramouliPrahlad SureshKevin D. FairbanksLanier A. WatkinsWilliam H. RobinsonPublished in: CCNC (2017)
Keyphrases
- network traffic
- mobile devices
- intrusion detection
- computer networks
- anomaly detection
- network management
- network security
- network bandwidth
- context aware
- network monitoring
- traffic analysis
- intrusion detection system
- internet traffic
- network intrusion detection
- traffic data
- mobile networks
- network resources
- traffic volume
- mobile phone
- detecting anomalous
- traffic patterns
- databases
- network traffic data
- long range dependence
- mobile computing
- wireless networks
- data analysis
- information systems
- machine learning