메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Enhancing security using mobility profile for cellular mobile networks

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR MOBILE NETWORKS; FALSE POSITIVE RATES; INSTANCE-BASED LEARNING (IBL) TECHNIQUES; NETWORK MODELS;

EID: 50949125328     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2006.297     Document Type: Conference Paper
Times cited : (1)

References (8)
  • 1
    • 18844459283 scopus 로고    scopus 로고
    • Potential fraudulent usage in mobile telecommunications networks
    • Y.-B. Lin, M. Chen, and H. Rao, "Potential fraudulent usage in mobile telecommunications networks", IEEE Tran. on Mobile Computing, vol. 1, no. 2, 2002, pp. 123-131.
    • (2002) IEEE Tran. on Mobile Computing , vol.1 , Issue.2 , pp. 123-131
    • Lin, Y.-B.1    Chen, M.2    Rao, H.3
  • 2
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusion-detection systems", Annales des Telecomm., vol. 55, 2000, pp. 361-378.
    • (2000) Annales des Telecomm , vol.55 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 3
    • 11244286137 scopus 로고    scopus 로고
    • Mobility-Based Anomaly Detection in Cellular Mobile Networks
    • Philadelphia, PA
    • B. Sun, F. Yu, K. Wu and VCM Leung, "Mobility-Based Anomaly Detection in Cellular Mobile Networks," ACM WiSe '04, Philadelphia, PA, 2004, pp. 61-69.
    • (2004) ACM WiSe '04 , pp. 61-69
    • Sun, B.1    Yu, F.2    Wu, K.3    Leung, V.C.M.4
  • 4
    • 33746859794 scopus 로고    scopus 로고
    • Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users
    • Montreal, Canada, Aug. 22-24
    • J. Hall, M. Barbeau, and E. Kranakis, "Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users," IEEE WiMob'2005, Montreal, Canada, Aug. 22-24, 2005, pp. 17-24.
    • (2005) IEEE WiMob'2005 , pp. 17-24
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 5
    • 0031234827 scopus 로고    scopus 로고
    • IDAMN: An Intrusion Detection Architecture for Mobile Networks
    • D. Samfat, and R. Molva, "IDAMN: An Intrusion Detection Architecture for Mobile Networks," IEEE J SAC, vol. 15, no. 7 , pp. 1373-1380, 1997.
    • (1997) IEEE J SAC , vol.15 , Issue.7 , pp. 1373-1380
    • Samfat, D.1    Molva, R.2
  • 6
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • Aug
    • T. Lane, and C.E. Brodley, "Temporal sequence learning and data reduction for anomaly detection," ACM TISSEC, Vol. 2, no. 3, Aug. 1999.
    • (1999) ACM TISSEC , vol.2 , Issue.3
    • Lane, T.1    Brodley, C.E.2
  • 8
    • 4944258275 scopus 로고    scopus 로고
    • Some notes on space, location and travel behaviour
    • Monte Verita, Ascona
    • S. Schonfelder, "Some notes on space, location and travel behaviour", Swiss Transport Research Conference, Monte Verita, Ascona, 2001.
    • (2001) Swiss Transport Research Conference
    • Schonfelder, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.