The rapidly increasing data usage and overload in mobile broadband networks has driven mobile network providers to actively detect and bill customers who tether tablets and laptops to their mobile phone for mobile Internet access. However, users may not be willing to pay additional fees only because they use their bandwidth differently, and may con- sider tethering detection as violation of their privacy. Fur- thermore, accurate tethering detection is becoming harder for providers as many modern smartphones are under full control of the user, running customized, complex software and applications similar to desktop systems. In this work, we analyze the network characteristics avail- able to network providers to detect tethering c...
A defining characteristic of smartphones is the availability of short-range radio transceivers (the ...
The hundreds of millions of deployed smartphones provide an unprecedented opportunity to collect dat...
Smart mobile devices are being used to create, consume and share a variety of user data with others,...
The rapidly increasing data usage and overload in mobile broadband networks has driven mobile networ...
The rapidly increasing data usage and overload in mobile broadband networks has driven mobile networ...
Recent advances in IT have offered people the opportunity to have powerful ultramobile devices in th...
Copyright © 2014 Sungcheon Lee and Hyun-chul Kim. This is an open access article distributed under t...
Despite our growing reliance on mobile phones for a wide range of daily tasks, we remain largely in ...
Smartphone users are increasingly shifting to using apps as “gate-ways ” to Internet services rather...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
Abstract—Smart portable devices form the largest personal computing platform so far in human history...
This project seeks to answer the questions: who are our phones sending information to and under what...
Mobile phones and tablets can be considered as the first in-carnation of the post-PC era. Their expl...
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial su...
Smartphones and tablets have been growing in popularity. These ultra mobile devices bring in new cha...
A defining characteristic of smartphones is the availability of short-range radio transceivers (the ...
The hundreds of millions of deployed smartphones provide an unprecedented opportunity to collect dat...
Smart mobile devices are being used to create, consume and share a variety of user data with others,...
The rapidly increasing data usage and overload in mobile broadband networks has driven mobile networ...
The rapidly increasing data usage and overload in mobile broadband networks has driven mobile networ...
Recent advances in IT have offered people the opportunity to have powerful ultramobile devices in th...
Copyright © 2014 Sungcheon Lee and Hyun-chul Kim. This is an open access article distributed under t...
Despite our growing reliance on mobile phones for a wide range of daily tasks, we remain largely in ...
Smartphone users are increasingly shifting to using apps as “gate-ways ” to Internet services rather...
Recent years have witnessed significant growth in the mobile device landscape as smartphones and tab...
Abstract—Smart portable devices form the largest personal computing platform so far in human history...
This project seeks to answer the questions: who are our phones sending information to and under what...
Mobile phones and tablets can be considered as the first in-carnation of the post-PC era. Their expl...
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial su...
Smartphones and tablets have been growing in popularity. These ultra mobile devices bring in new cha...
A defining characteristic of smartphones is the availability of short-range radio transceivers (the ...
The hundreds of millions of deployed smartphones provide an unprecedented opportunity to collect dat...
Smart mobile devices are being used to create, consume and share a variety of user data with others,...