Cite
Analyzing Android Encrypted Network Traffic to Identify User Actions.
MLA
Conti, Mauro, et al. “Analyzing Android Encrypted Network Traffic to Identify User Actions.” IEEE Transactions on Information Forensics & Security, vol. 11, no. 1, Jan. 2016, pp. 114–25. EBSCOhost, https://doi.org/10.1109/TIFS.2015.2478741.
APA
Conti, M., Mancini, L. V., Spolaor, R., & Verde, N. V. (2016). Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Transactions on Information Forensics & Security, 11(1), 114–125. https://doi.org/10.1109/TIFS.2015.2478741
Chicago
Conti, Mauro, Luigi Vincenzo Mancini, Riccardo Spolaor, and Nino Vincenzo Verde. 2016. “Analyzing Android Encrypted Network Traffic to Identify User Actions.” IEEE Transactions on Information Forensics & Security 11 (1): 114–25. doi:10.1109/TIFS.2015.2478741.