
Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16092
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bhatia, Ashutosh | - |
dc.contributor.author | Tiwari, Kamlesh | - |
dc.date.accessioned | 2024-10-15T09:10:41Z | - |
dc.date.available | 2024-10-15T09:10:41Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/abstract/document/9352901 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16092 | - |
dc.description.abstract | The recent decade has witnessed phenomenal growth in communication technology. Development of user friendly software platforms, such as Facebook, WhatsApp etc. have facilitated ease of communication and thereby people have started freely sharing messages and multimedia over the Internet. Further, there is a shift in trends with services being accessed from smartphones over personal computers. To protect the security and privacy of the smartphone users, most of the applications use encryption that encapsulates communications over the Internet. However, research has shown that the statistical information present in a traffic can be used to identify the application, and further, the activity performed by the user inside that application. In this paper, we extend the scope of analysis by proposing a learning framework to leverage application and activity data to profile smartphone users in terms of their gender, profession age group etc. This will greatly help the authoritative agencies to conduct their investigations related to national security and other purposes | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Encrypted Traffic Analysis | en_US |
dc.subject | User Profiling | en_US |
dc.subject | Deep learning | en_US |
dc.title | User Profiling Using Smartphone Network Traffic Analysis | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.