ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Jingjing RenAshwin RaoMartina LindorferArnaud LegoutDavid R. ChoffnesPublished in: MobiSys (2016)
Keyphrases
- network traffic
- intrusion detection
- anomaly detection
- computer networks
- mobile devices
- network security
- intrusion detection system
- internet traffic
- traffic data
- network management
- network bandwidth
- mobile phone
- mobile applications
- traffic volume
- network traffic data
- traffic analysis
- mobile networks
- network monitoring
- traffic patterns
- long range dependence
- network resources
- information systems
- information security
- context aware
- mobile users
- object recognition
- detecting anomalous
- normal traffic
- databases