Fast Application Activity Recognition with Encrypted Traffic
暂无分享,去创建一个
Weiping Wang | Shigeng Zhang | Xue Liu | Huihui Li | Shigeng Zhang | Weiping Wang | Xue Liu | Huihui Li
[1] Qiang Xu,et al. Identifying diverse usage behaviors of smartphone apps , 2011, IMC '11.
[2] Nino Vincenzo Verde,et al. Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis , 2014, CODASPY.
[3] Nino Vincenzo Verde,et al. Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.
[4] Hyoungshick Kim,et al. Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis , 2015, WISA.
[5] Liehuang Zhu,et al. Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams , 2017, IEEE Transactions on Information Forensics and Security.
[6] Yong Liao,et al. SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic , 2015, MobiCom.
[7] Mauro Conti,et al. Robust Smartphone App Identification via Encrypted Network Traffic Analysis , 2017, IEEE Transactions on Information Forensics and Security.
[8] Jasleen Kaur,et al. Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? , 2016, WISEC.