메뉴 건너뛰기




Volumn , Issue , 2000, Pages 359-363

Safety and security for 2000 telecommunications

Author keywords

Cellular networks; Cloning; Communication system security; Geography; Intrusion detection; Mobile communication; Next generation networking; Safety; Telecommunication network management; Wireless LAN

Indexed keywords

ACCIDENT PREVENTION; CELLULAR TELEPHONE SYSTEMS; CLONING; GENETIC ENGINEERING; INFORMATION SYSTEMS; INTRUSION DETECTION; MERCURY (METAL); MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK MANAGEMENT; NEXT GENERATION NETWORKS; TELECOMMUNICATION NETWORKS; WIDE AREA NETWORKS; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0010853324     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EURCOM.2000.874833     Document Type: Conference Paper
Times cited : (1)

References (19)
  • 2
    • 84952882229 scopus 로고    scopus 로고
    • Neural Frauds Detection in Mobile Phone Operations
    • Cancun
    • A. Boukerche, M. S.M.A. Notare Neural Frauds Detection in Mobile Phone Operations, IEEE BioSP3, Cancun, 2000.
    • (2000) IEEE BioSP3
    • Boukerche, A.1    Notare, M.S.M.A.2
  • 5
    • 0023294428 scopus 로고
    • An Intrusion-Detection Model
    • D. Denning, An Intrusion-Detection Model, IEEE Transactions on Sof. Eng., 2(13), 1987, pp. 222-232.
    • (1987) IEEE Transactions on Sof. Eng. , vol.2 , Issue.13 , pp. 222-232
    • Denning, D.1
  • 6
    • 0032164246 scopus 로고    scopus 로고
    • Network Security: It's time to take it Seriously
    • Sept98
    • P. Dowd, J.T. McHenry, Network Security: It's time to take it Seriously, IEEE Computer Magazine, 9(31), Sept98, pp.24-28.
    • IEEE Computer Magazine , vol.9 , Issue.31 , pp. 24-28
    • Dowd, P.1    McHenry, J.T.2
  • 8
    • 84969573885 scopus 로고
    • Asax: Software Architecture and Rule-based language for universal audit trail analysis
    • Proc. 2nd European Symp. On Research in Computer Security
    • N. Habra et. al., Asax: Software Architecture and Rule-based language for universal audit trail analysis, Proc. 2nd European Symp. On Research in Computer Security, LNCS, vol 648, 1992.
    • (1992) LNCS , vol.648
    • Habra, N.1
  • 9
    • 0023855839 scopus 로고
    • An Introduction to Neural Computing
    • T. Kohonen, An Introduction to Neural Computing, Neural Networks, Vol. 1, pp. 3-16, (1988).
    • (1988) Neural Networks , vol.1 , pp. 3-16
    • Kohonen, T.1
  • 11
    • 0003111439 scopus 로고
    • Automated Audit trail Analysis and Intrusion Detection: A Survey
    • T.Lunt, Automated Audit trail Analysis and Intrusion Detection: a Survey, Proc. 11th Int'l Comp. Security Conf., 1988, pp. 65-73
    • (1988) Proc. 11th Int'l Comp. Security Conf. , pp. 65-73
    • Lunt, T.1
  • 15
    • 0031238281 scopus 로고    scopus 로고
    • Security and Privacy: Promising Advances
    • C. Pfleeger, D. Cooper, Security and Privacy: Promising Advances, IEEE Software, 1997.
    • (1997) IEEE Software
    • Pfleeger, C.1    Cooper, D.2
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.