共 44 条
- [31] Know your Big Data Trade-offs when Classifying Encrypted Mobile Traffic with Deep Learning PROCEEDINGS OF THE 3RD NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA 2019), 2019, : 121 - 128
- [32] Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 61 - 66
- [33] Analysis on password protection in Android applications 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 504 - 507
- [34] What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile Applications PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 538 - 550
- [35] An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (04): : 1917 - 1931
- [36] An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks Cluster Computing, 2018, 21 : 1917 - 1931
- [37] Forensic Analysis of Dating Applications on Android and iOS Devices 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 837 - 848
- [38] Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 196 - 203
- [39] Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 665 - 673
- [40] Investigating Wearable Fitness Applications: Data Privacy and Digital Forensics Analysis on Android APPLIED SCIENCES-BASEL, 2022, 12 (19):