DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16092
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhatia, Ashutosh-
dc.contributor.authorTiwari, Kamlesh-
dc.date.accessioned2024-10-15T09:10:41Z-
dc.date.available2024-10-15T09:10:41Z-
dc.date.issued2021-
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/9352901-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16092-
dc.description.abstractThe recent decade has witnessed phenomenal growth in communication technology. Development of user friendly software platforms, such as Facebook, WhatsApp etc. have facilitated ease of communication and thereby people have started freely sharing messages and multimedia over the Internet. Further, there is a shift in trends with services being accessed from smartphones over personal computers. To protect the security and privacy of the smartphone users, most of the applications use encryption that encapsulates communications over the Internet. However, research has shown that the statistical information present in a traffic can be used to identify the application, and further, the activity performed by the user inside that application. In this paper, we extend the scope of analysis by proposing a learning framework to leverage application and activity data to profile smartphone users in terms of their gender, profession age group etc. This will greatly help the authoritative agencies to conduct their investigations related to national security and other purposesen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectEncrypted Traffic Analysisen_US
dc.subjectUser Profilingen_US
dc.subjectDeep learningen_US
dc.titleUser Profiling Using Smartphone Network Traffic Analysisen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.