ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1708.03766
  4. Cited By
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic
  Analysis
v1v2v3 (latest)

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

12 August 2017
Mauro Conti
Qian Qian Li
Alberto Maragno
Riccardo Spolaor
ArXiv (abs)PDFHTML

Papers citing "The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis"

8 / 8 papers shown
Title
Locality Sensitive Hashing for Network Traffic Fingerprinting
Locality Sensitive Hashing for Network Traffic Fingerprinting
Nowfel Mashnoor
Jay Thom
A. Rouf
S. Sengupta
Batyr Charyyev
33
1
0
12 Feb 2024
A Testbed for Automating and Analysing Mobile Devices and their
  Applications
A Testbed for Automating and Analysing Mobile Devices and their Applications
Lachlan Simpson
Kyle Millar
A. Cheng
Hong-Gunn Chew
Cheng-Chew Lim
21
1
0
15 Sep 2023
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security
  Ecosystem
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem
A. Michalas
Constantinos Patsakis
D. Vergados
D. Vergados
80
1
0
18 Dec 2022
Machine Learning for Encrypted Malicious Traffic Detection: Approaches,
  Datasets and Comparative Study
Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study
Zihao Wang
Fok Kar Wai
V. Thing
AAML
75
78
0
17 Mar 2022
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
Ashutosh Bhatia
Ankit Agrawal
Kamlesh Tiwari
K. Haribabu
D. Vishwakarma
10
19
0
22 Jun 2020
DeviceWatch: Identifying Compromised Mobile Devices through Network
  Traffic Analysis and Graph Inference
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference
Euijin Choo
Mohamed Nabeel
Mashael Alsabah
Issa M. Khalil
Ting Yu
Wei Wang
16
1
0
27 Nov 2019
AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy
  Token System
AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy Token System
Lanny Z. N. Yuan
Huaibing Jian
Peng Liu
Pengxin Zhu
ShanYang Fu
21
0
0
18 Dec 2018
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Huayi Duan
Cong Wang
Lizhen Qu
Yajin Zhou
Qian Wang
K. Ren
61
81
0
20 Jun 2017
1