-
1
-
-
33746368048
-
Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks
-
May
-
B. Sun, F. Yu, K. Wu, Y. Xiao and V.C.M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Trans. Vehicular Technology, Vol. 55, No. 3, May 2006, pp. 1385-1396.
-
(2006)
IEEE Trans. Vehicular Technology
, vol.55
, Issue.3
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
2
-
-
18844459283
-
Potential Fraudulent Usage in Mobile Telecommunications Networks
-
Y.-B. Lin, M. Chen, and H. Rao, "Potential Fraudulent Usage in Mobile Telecommunications Networks," IEEE Transactions on Mobile Computing Vol. 1, No. 2, 2002, pp. 123-131.
-
(2002)
IEEE Transactions on Mobile Computing
, vol.1
, Issue.2
, pp. 123-131
-
-
Lin, Y.-B.1
Chen, M.2
Rao, H.3
-
3
-
-
17144430885
-
Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol
-
March
-
M. Zhang, and Y. Fang, "Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol," IEEE Transactions on Wireless Communication, Vol.4, No.2, March 2005, pp. 734-742.
-
(2005)
IEEE Transactions on Wireless Communication
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
4
-
-
0034226287
-
A Revised Taxonomy for Intrusion-Detection Systems
-
H. Debar, M. Dacier, and A. Wespi, "A Revised Taxonomy for Intrusion-Detection Systems," Annales des Telecommunications, Vol. 55, 2000, pp. 361-378.
-
(2000)
Annales des Telecommunications
, vol.55
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
5
-
-
0023294428
-
An Intrusion-Detection Model
-
Feb
-
D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, Vol. 13, No. 7, Feb. 1987, pp. 222-232.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.7
, pp. 222-232
-
-
Denning, D.E.1
-
6
-
-
11244286137
-
Mobility-Based Anomaly Detection in Cellular Mobile Networks
-
Philadelphia, PA
-
B. Sun, F. Yu, K. Wu and VCM Leung, "Mobility-Based Anomaly Detection in Cellular Mobile Networks," Proceedings of ACM Wireless Security (WiSe'04) in conjunction with ACM Mobicom'04, Philadelphia, PA, 2004, pp. 61-69.
-
(2004)
Proceedings of ACM Wireless Security (WiSe'04) in conjunction with ACM Mobicom'04
, pp. 61-69
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Leung, V.C.M.4
-
7
-
-
0032630098
-
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
-
Oakland, CA, May
-
U. Lindqvist, and P. A. Porras, "Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)," Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999, pp. 146-161.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
9
-
-
0027150412
-
Ustat: A Real-time Intrusion Detection System for Unix
-
Oakland, CA, May
-
K. Ilgun, "Ustat: A Real-time Intrusion Detection System for Unix," Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1993, pp. 16-28.
-
(1993)
Proceedings of IEEE Symposium on Research in Security and Privacy
, pp. 16-28
-
-
Ilgun, K.1
-
10
-
-
0026850007
-
A Neural Network Component for an Intrusion Detection System
-
Oakland, CA, May
-
H. Debar, M. Becker and D. Siboni, "A Neural Network Component for an Intrusion Detection System," Proceedings of 1992 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1992, pp. 240-250.
-
(1992)
Proceedings of 1992 IEEE Symposium on Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
11
-
-
33746859794
-
Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users
-
Montreal, Canada, Aug. 22-24
-
J. Hall, M. Barbeau, and E. Kranakis, "Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users," IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Montreal, Canada, Aug. 22-24, 2005.
-
(2005)
IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
12
-
-
0031234827
-
IDAMN: An Intrusion Detection Architecture for Mobile Networks
-
Sept
-
D. Samfat, and R. Molva, "IDAMN: An Intrusion Detection Architecture for Mobile Networks," IEEE Journal on Selected Areas in Communications, Vol. 15, No. 7, Sept. 1997, pp. 1373-1380.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.7
, pp. 1373-1380
-
-
Samfat, D.1
Molva, R.2
-
13
-
-
19544394267
-
A Predictive Location Model for Location-based Services
-
New Orleans, Louisiana
-
H. A. Karimi, and X, Liu, "A Predictive Location Model for Location-based Services," Proceedings of the 11th ACM international symposium on Advances in geographic information systems, New Orleans, Louisiana, 2003, pp. 126-133.
-
(2003)
Proceedings of the 11th ACM international symposium on Advances in geographic information systems
, pp. 126-133
-
-
Karimi, H.A.1
Liu, X.2
-
14
-
-
0031358998
-
Modeling PCS Networks Under General Call Holding Time and Cell Residence Time Distributions
-
Y. Fang, I. Chlamtac, and Y. Lin, "Modeling PCS Networks Under General Call Holding Time and Cell Residence Time Distributions," IEEE Tran. on Networking, Vol. 5, No. 6, 1997.
-
(1997)
IEEE Tran. on Networking
, vol.5
, Issue.6
-
-
Fang, Y.1
Chlamtac, I.2
Lin, Y.3
-
15
-
-
0003922190
-
-
Wiley, 2nd Edition, Oct
-
R.O. Duda, P.E. Hart, and D.G. Stork, "Pattern Classification", Wiley, 2nd Edition, Oct. 2000.
-
(2000)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
16
-
-
0002688690
-
Discovery of Fraud Rules for Telecommunications Challenges and Solutions
-
San Diego, CA
-
S. Rosset, U. Murad, E. Neumann, Y. Idan, and G. Pinkas, "Discovery of Fraud Rules for Telecommunications Challenges and Solutions", ACM SIGKDD, San Diego, CA, 1999, pp. 409-413.
-
(1999)
ACM SIGKDD
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
17
-
-
0032309517
-
An Evaluation of High-end Data Mining tools for Fraud Detection
-
Man, and Cybernetics, San Diego CA
-
D. W. Abbott, I. P. Matkovsky, and J. F. Elder, "An Evaluation of High-end Data Mining tools for Fraud Detection", Proc. of the 1998 IEEE International Conference on Systems, Man, and Cybernetics, San Diego CA, 1998, pp. 2836-2841.
-
(1998)
Proc. of the 1998 IEEE International Conference on Systems
, pp. 2836-2841
-
-
Abbott, D.W.1
Matkovsky, I.P.2
Elder, J.F.3
-
18
-
-
84956705634
-
Detection of Mobile Phone Fraud using Supervised Neural Networks: A First Prototype
-
Lausanne, Switzerland
-
Y. Moreau, H. Verrelst, and J. Vandewalle, "Detection of Mobile Phone Fraud using Supervised Neural Networks: A First Prototype", Proc. of the International Conference on Artificial Neural Networks, Lausanne, Switzerland, 1997, pp. 1065-1070.
-
(1997)
Proc. of the International Conference on Artificial Neural Networks
, pp. 1065-1070
-
-
Moreau, Y.1
Verrelst, H.2
Vandewalle, J.3
-
19
-
-
0001821556
-
Detecting Cellular Fraud using Adaptive Prototypes
-
Providence, Rhode Island
-
P. Burge and J. Shawe-Taylor, "Detecting Cellular Fraud using Adaptive Prototypes", AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, Providence, Rhode Island, 1997, pp. 9-13.
-
(1997)
AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management
, pp. 9-13
-
-
Burge, P.1
Shawe-Taylor, J.2
-
20
-
-
84255186507
-
How to Increase Security in Mobile Networks by Anomaly Detection
-
Scottsdale, AZ
-
R. Büschkes, D. Kesdogan, and P. Reichl, "How to Increase Security in Mobile Networks by Anomaly Detection", ACRAC'98, Scottsdale, AZ, 1998, pp. 3-12.
-
(1998)
ACRAC'98
, pp. 3-12
-
-
Büschkes, R.1
Kesdogan, D.2
Reichl, P.3
-
21
-
-
21644482790
-
Worm Detection, Early Warning and Response Based on Local Victim Information
-
Tucson, Arizona, USA. December 6-10
-
G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley, "Worm Detection, Early Warning and Response Based on Local Victim Information", ACRAC'04, Tucson, Arizona, USA. December 6-10, 2004.
-
(2004)
ACRAC'04
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
22
-
-
14844319067
-
Anomaly Detection of Web-based Attacks
-
Washington D.C
-
C. Kruegel, and G. Vigna, "Anomaly Detection of Web-based Attacks", ACM CCS'03, Washington D.C., 2003, pp. 251-261.
-
(2003)
ACM CCS'03
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
23
-
-
2542616812
-
Quest for Personal Control over Mobile Location Privacy
-
May
-
Q. He, D. Wu, and P. Khosla, "Quest for Personal Control over Mobile Location Privacy," IEEE Communications Magazine, Vol. 42, No. 5, May 2004, pp. 130-136.
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
24
-
-
4944258275
-
Some Notes on Space, Location and Travel Behaviour
-
Monte Verita, Ascona
-
S. Schonfelder, "Some Notes on Space, Location and Travel Behaviour", Swiss Transport Research Conference, Monte Verita, Ascona, 2001.
-
(2001)
Swiss Transport Research Conference
-
-
Schonfelder, S.1
-
25
-
-
0033795211
-
Development of a Transit Network from a Street Map Database with Spatial Analysis and Dynamic Segmentation
-
January
-
K. Choi, and W. Jang, "Development of a Transit Network from a Street Map Database with Spatial Analysis and Dynamic Segmentation," Transport Research Part C Emerging Technologies, Vol. 8, No. 1, pp. 129-146, January 2000.
-
(2000)
Transport Research Part C Emerging Technologies
, vol.8
, Issue.1
, pp. 129-146
-
-
Choi, K.1
Jang, W.2
-
26
-
-
77949731575
-
Temporal Sequence Learning and Data Reduction for Anomaly Detection
-
August
-
T. Lane, and C.E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Transactions on Information and System Security (TISSEC), Vol. 2, No. 3, August 1999, pp. 295-331.
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
27
-
-
36749082203
-
-
T.M. Mitchell, Machine Learning, McGraw Hill, 1997, ISBN, 0-07-042-807-7.
-
T.M. Mitchell, "Machine Learning", McGraw Hill, 1997, ISBN, 0-07-042-807-7.
-
-
-
|