메뉴 건너뛰기




Volumn 6033 LNCS, Issue , 2010, Pages 31-46

A probabilistic diffusion scheme for anomaly detection on smartphones

Author keywords

Anomaly detection; Machine learning; Mobile security

Indexed keywords

ANOMALY DETECTION; BANDWIDTH LIMITATION; BIPARTITE GRAPHS; COMPUTING POWER; DIFFUSION ALGORITHM; DIFFUSION KERNEL; FEATURE SPACE; GENERAL-PURPOSE COMPUTING; KULLBACK LEIBLER DIVERGENCE; LIMITED TRAINING DATA; MACHINE-LEARNING; MALICIOUS SOFTWARE; MALWARES; MOBILE SECURITY; NORMAL BEHAVIOR; RESEARCH CHALLENGES; SAMPLE POINT; SAMPLE SPACE; SECURITY ATTACKS; SIMILARITY MEASURE; SMART-PHONES; STOCHASTIC DIFFUSION PROCESS; USAGE PATTERNS;

EID: 78650393426     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12368-9_3     Document Type: Conference Paper
Times cited : (12)

References (28)
  • 2
    • 14344257107 scopus 로고    scopus 로고
    • A game theoretic analysis of intrusion detection in access control systems
    • Alpcan, T., Başar, T.: A game theoretic analysis of intrusion detection in access control systems. In: Proc. IEEE Conf. Decision and Control, pp. 1568-1573 (2004).
    • (2004) Proc. IEEE Conf. Decision and Control , pp. 1568-1573
    • Alpcan, T.1    Başar, T.2
  • 3
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • Axelsson, S.: The base-rate fallacy and its implications for the difficulty of intrusion detection. In: Proc. ACM Conf. on Computer and Communications Security, pp. 1-7 (1999).
    • (1999) Proc. ACM Conf. on Computer and Communications Security , pp. 1-7
    • Axelsson, S.1
  • 6
    • 38349070683 scopus 로고    scopus 로고
    • Decentralized detector generation in cooperative intrusion detection systems
    • Masuzawa, T. Tixeuil, S. (eds.), LNCS, Springer, Heidelberg
    • Bye, R., Luther, K., Camtepe, S.A., Alpcan, T., Albayrak, S., Yener, B.: Decentralized detector generation in cooperative intrusion detection systems. In: Masuzawa, T., Tixeuil, S. (eds.) SSS 2007. LNCS, vol. 4838, pp. 37-51. Springer, Heidelberg (2007).
    • (2007) SSS 2007 , vol.4838 , pp. 37-51
    • Bye, R.1    Luther, K.2    Camtepe, S.A.3    Alpcan, T.4    Albayrak, S.5    Yener, B.6
  • 9
    • 34547919197 scopus 로고    scopus 로고
    • The future of mobile malware
    • August
    • Coursen, S.: The future of mobile malware. Network Security (8), 7-11 (August 2007).
    • (2007) Network Security , Issue.8 , pp. 7-11
    • Coursen, S.1
  • 10
    • 33645146449 scopus 로고    scopus 로고
    • Histograms of oriented gradients for human detection
    • Dalal, N., Triggs, B.: Histograms of Oriented Gradients for Human Detection. In: Proc. CVPR, vol. 2, pp. 886-893 (2005).
    • (2005) Proc. CVPR , vol.2 , pp. 886-893
    • Dalal, N.1    Triggs, B.2
  • 11
    • 33645311516 scopus 로고    scopus 로고
    • Reality mining: Sensing complex social systems
    • Eagle, N., Pentland, A.S.: Reality mining: sensing complex social systems. Personal Ubiquitous Computing 10(4), 255-268 (2006).
    • (2006) Personal Ubiquitous Computing , vol.10 , Issue.4 , pp. 255-268
    • Eagle, N.1    Pentland, A.S.2
  • 12
    • 33847766633 scopus 로고    scopus 로고
    • Random-walk computation of similarities between nodes of a graph with application to collaborative recommendation
    • Fouss, F., Pirotte, A., Renders, J.M., Saerens, M.: Random-Walk Computation of Similarities between Nodes of a Graph with Application to Collaborative Recommendation. IEEE Trans. on Knowledge and Data Engineering 19(3), 355-369 (2007).
    • (2007) IEEE Trans. on Knowledge and Data Engineering , vol.19 , Issue.3 , pp. 355-369
    • Fouss, F.1    Pirotte, A.2    Renders, J.M.3    Saerens, M.4
  • 13
    • 47949102777 scopus 로고    scopus 로고
    • Star-structured higher-order heterogeneous data co-clustering based on consistent information theory
    • Gao, B., Liu, T.Y., Ma, W.Y.: Star-Structured Higher-Order Heterogeneous Data Co-Clustering Based on Consistent Information Theory. In: Proc. ICDM, pp. 880-884 (2006).
    • (2006) Proc. ICDM , pp. 880-884
    • Gao, B.1    Liu, T.Y.2    Ma, W.Y.3
  • 15
    • 33750317385 scopus 로고    scopus 로고
    • Kernels for graphs
    • Schölkopf, B. Tsuda, K. Vert, J.P. (eds.), MIT Press, Cambridge
    • Kashima, H., Tsuda, K., Inokuchi, A.: Kernels for graphs. In: Schölkopf, B., Tsuda, K., Vert, J.P. (eds.) Kernel Methods in Computational Biology, pp. 155-170. MIT Press, Cambridge (2004).
    • (2004) Kernel Methods in Computational Biology , pp. 155-170
    • Kashima, H.1    Tsuda, K.2    Inokuchi, A.3
  • 16
    • 0041775676 scopus 로고    scopus 로고
    • Diffusion kernels on graphs and other discrete input spaces
    • Kondor, R., Lafferty, J.: Diffusion Kernels on Graphs and Other Discrete Input Spaces. In: Proc. ICML, pp. 315-322 (2002).
    • (2002) Proc. ICML , pp. 315-322
    • Kondor, R.1    Lafferty, J.2
  • 17
    • 17444429623 scopus 로고    scopus 로고
    • A survey of eigenvector methods for web information retrieval
    • Langville, A., Meyer, C.: A Survey of Eigenvector Methods for Web Information Retrieval. SIAM Review 47(1), 135-161 (2005).
    • (2005) SIAM Review , vol.47 , Issue.1 , pp. 135-161
    • Langville, A.1    Meyer, C.2
  • 20
    • 78650338440 scopus 로고    scopus 로고
    • New approaches to malware detection coming into view
    • April
    • Messmer, E.: New approaches to malware detection coming into view. Network World (April 2007), http://www.networkworld.com/news/2007/042507- malware-detection.html.
    • (2007) Network World
    • Messmer, E.1
  • 24
    • 77953711643 scopus 로고    scopus 로고
    • A malware detector placement game for intrusion detection
    • Lopez, J. Hämmerli, B.M. (eds.), LNCS, Springer, Heidelberg
    • Schmidt, S., Alpcan, T., Albayrak, S., Başar, T., Muller, A.: A malware detector placement game for intrusion detection. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141. Springer, Heidelberg (2008).
    • (2008) CRITIS 2007 , vol.5141
    • Schmidt, S.1    Alpcan, T.2    Albayrak, S.3    Başar, T.4    Muller, A.5
  • 25
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Jonsson, E. Valdes, A. Almgren, M. (eds.), LNCS, Springer, Heidelberg
    • Wang, K., Stolfo, S.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004).
    • (2004) RAID 2004 , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.2
  • 26
    • 33748126220 scopus 로고    scopus 로고
    • Factor-analysis based anomaly detection and clustering
    • DOI 10.1016/j.dss.2005.01.005, PII S0167923605000096
    • Wu, N., Zhang, J.: Factor-analysis Based Anomaly Detection and Clustering. Decision Support Systems 42(1), 375-389 (2006). (Pubitemid 44308263)
    • (2006) Decision Support Systems , vol.42 , Issue.1 , pp. 375-389
    • Wu, N.1    Zhang, J.2
  • 27
    • 26444504890 scopus 로고    scopus 로고
    • A mobile phone malicious software detection model with behavior checker
    • Shimojo, S. Ichii, S. Ling, T.-W. Song, K.-H. (eds.), LNCS, Springer, Heidelberg
    • Yap, T.S., Ewe, H.T.: A mobile phone malicious software detection model with behavior checker. In: Shimojo, S., Ichii, S., Ling, T.-W., Song, K.-H. (eds.) HSI 2005. LNCS, vol. 3597, pp. 57-65. Springer, Heidelberg (2005).
    • (2005) HSI 2005 , vol.3597 , pp. 57-65
    • Yap, T.S.1    Ewe, H.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.