-
2
-
-
0036749185
-
Behavior-based intrusion detection in mobile phone systems
-
Boukerche, A., Nitare, M. S. M. A.: Behavior-based intrusion detection in mobile phone systems. J. Parallel Distrib. Comput. 62(9), 1476-1490 (2002).
-
(2002)
J. Parallel Distrib. Comput.
, vol.62
, Issue.9
, pp. 1476-1490
-
-
Boukerche, A.1
Nitare, M.S.M.A.2
-
3
-
-
84255186507
-
How to increase security in mobile networks by anomaly detection
-
Buschkes, R., Kesdogan, D., Reichl, P.: How to increase security in mobile networks by anomaly detection. In: Proceedings of the 14th Annual Computer Security Applications Conference, pp. 3-12 (1998).
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 3-12
-
-
Buschkes, R.1
Kesdogan, D.2
Reichl, P.3
-
5
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
Clarke, N. L., Furnell, S. M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1-14 (2006).
-
(2006)
Int. J. Inf. Secur.
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
6
-
-
26844493026
-
Authentication of users on mobile telephones-a survey of attitudes and practices
-
Clarke, N. L., Furnell, S. M.: Authentication of users on mobile telephones-a survey of attitudes and practices. Comput. Secur. 24(7), 519-527 (2005).
-
(2005)
Comput. Secur.
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.L.1
Furnell, S.M.2
-
7
-
-
34250355113
-
The application of signature recognition to transparent handwriting verification for mobile devices
-
Clarke, N. L., Mekala, A. R.: The application of signature recognition to transparent handwriting verification for mobile devices. Inf. Manag. Comput. Secur. 15(3), 214-225 (2007).
-
(2007)
Inf. Manag. Comput. Secur.
, vol.15
, Issue.3
, pp. 214-225
-
-
Clarke, N.L.1
Mekala, A.R.2
-
8
-
-
84857500845
-
Flexible and transparent user authentication for mobile devices
-
Pafos, Cyprus, May 18-20, ISBN: 978-3-642-01243-3
-
Clarke, N. L., Karatzouni, S., Furnell, S. M.: Flexible and transparent user authentication for mobile devices. In: Proceedings of the 24th IFIP TC 11 International Information Security Conference, Pafos, Cyprus, May 18-20, ISBN: 978-3-642-01243-3, pp. 1-12 (2009).
-
(2009)
Proceedings of the 24th IFIP TC 11 International Information Security Conference
, pp. 1-12
-
-
Clarke, N.L.1
Karatzouni, S.2
Furnell, S.M.3
-
9
-
-
84901221026
-
-
Credant, Phone Data makes 4. 2 Million Brits Vulnerable to ID Theft, Credant Accessed: 14 June 2012
-
Credant, Phone Data makes 4. 2 Million Brits Vulnerable to ID Theft, Credant, http://www. credant. com/news-a-events/press-releases/337-phone-data-makes-42-million-brits-vulnerable-to-id-theft. html (2009), Accessed: 14 June 2012.
-
(2009)
-
-
-
10
-
-
84901221027
-
-
DARPA, Active Authentication, DARPA aspx (2011), Accessed: 17 April 2012
-
DARPA, Active Authentication, DARPA, http://www. darpa. mil/OurWork/I2O/Programs/ActiveAuthentication. aspx (2011), Accessed: 17 April 2012.
-
-
-
-
11
-
-
78650503546
-
Unobtrusive user authentication on mobile phones using biometric gait recognition
-
Derawi, M. O., Nickel, C., Bours, P., Busch, C.: Unobtrusive user authentication on mobile phones using biometric gait recognition. In: Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 306-311 (2010).
-
(2010)
Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 306-311
-
-
Derawi, M.O.1
Nickel, C.2
Bours, P.3
Busch, C.4
-
12
-
-
70349313631
-
Inferring social network structure using mobile phone data
-
Eagle, N., Pentland, A., Lazer, D.: Inferring social network structure using mobile phone data. In: Proceedings of the National Academy of Sciences (PNAS), vol. 106, pp. 15274-15278 (2009).
-
(2009)
Proceedings of the National Academy of Sciences (PNAS)
, vol.106
, pp. 15274-15278
-
-
Eagle, N.1
Pentland, A.2
Lazer, D.3
-
13
-
-
84901221020
-
-
FBI, Smishing and Vishing, The FBI Accessed: 11 April 2012
-
FBI, Smishing and Vishing, The FBI, http://www. fbi. gov/news/stories/2010/november/cyber112410/cyber112410 (2010), Accessed: 11 April 2012.
-
(2010)
-
-
-
14
-
-
84901221021
-
-
Flurry, Mobile Apps: Models, Money and Loyalty. Flurry Smartphone Industry Pulse Accessed: 01 August 2012
-
Flurry, Mobile Apps: Models, Money and Loyalty. Flurry Smartphone Industry Pulse, http://blog. urry. com/bid/26376/Mobile-Apps-Models-Money-and-Loyalty (2009), Accessed: 01 August 2012.
-
(2009)
-
-
-
16
-
-
33746859794
-
Anomaly based intrusion detection using mobility profiles of public transportation users
-
Hall, J., Barbeau, M., Kranakis, E.: Anomaly based intrusion detection using mobility profiles of public transportation users. In: Proceeding of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol. 2, pp. 17-24 (2005).
-
(2005)
Proceeding of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, vol.2
, pp. 17-24
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
17
-
-
84901221010
-
-
ITU, Key Global Telecom Indicators for the World Telecommunication Service Sector, International Telecommunication Union Accessed 01 April 2012
-
ITU, Key Global Telecom Indicators for the World Telecommunication Service Sector, International Telecommunication Union, http://www. itu. int/ITUD/ict/statistics/atglance/KeyTelecom. html (2011), Accessed 01 April 2012.
-
(2011)
-
-
-
18
-
-
0033640646
-
Statistical pattern recognition: a review
-
doi:10.1109/34.824819
-
Jain, A. K., Duin, R. P. W., Mao, J.: Statistical pattern recognition: a review. Pattern Anal. Mach. Intell. IEEE Trans. 22(1), 4-37 (2000). doi: 10. 1109/34. 824819.
-
(2000)
Pattern Anal. Mach. Intell. IEEE Trans.
, vol.22
, Issue.1
, pp. 4-37
-
-
Jain, A.K.1
Duin, R.P.W.2
Mao, J.3
-
19
-
-
0030104449
-
Artificial neural networks: a tutorial
-
doi:10.1109/2.485891
-
Jain, A. K., Mao, J., Mohiuddin, K. M.: Artificial neural networks: a tutorial. Computer 29(3), 31-44 (1996). doi: 10. 1109/2. 485891.
-
(1996)
Computer
, vol.29
, Issue.3
, pp. 31-44
-
-
Jain, A.K.1
Mao, J.2
Mohiuddin, K.M.3
-
20
-
-
84901221011
-
-
Kaspersky Lab, European Users Mobile Behaviour and Awareness of Mobile Threats, Kaspersky Lab ZAO (2011), Accessed: 25 May 2012
-
Kaspersky Lab, European Users Mobile Behaviour and Awareness of Mobile Threats, Kaspersky Lab ZAO, http://www. kaspersky. com/news?id=207576289 (2011), Accessed: 25 May 2012.
-
-
-
-
23
-
-
84869596497
-
-
Profound Challenges, McAfee Accessed: 1 May 2012
-
Power, R.: Mobility and Security: Dazzling Opportunities, Profound Challenges, McAfee, http://www. mcafee. com/us/resources/reports/rp-cylab-mobilesecurity. pdf (2011), Accessed: 1 May 2012.
-
(2011)
Mobility and Security: Dazzling Opportunities
-
-
Power, R.1
-
24
-
-
0031234827
-
IDAMN: an intrusion detection architecture for mobile networks
-
Samfat, D., Molva, R.: IDAMN: an intrusion detection architecture for mobile networks. IEEE J. Sel. Areas Commun. 15(7), 1373-1380 (1997).
-
(1997)
IEEE J. Sel. Areas Commun.
, vol.15
, Issue.7
, pp. 1373-1380
-
-
Samfat, D.1
Molva, R.2
-
25
-
-
84901221012
-
-
Samsung, Galaxy Nexus, Samsung Accessed: 04 May 2012
-
Samsung., Galaxy Nexus, Samsung, http://www. samsung. com/uk/consumer/mobile-devices/smartphones/android/GT-I9250TSAXEU (2012), Accessed: 04 May 2012.
-
(2012)
-
-
-
26
-
-
84901221013
-
-
Securelist, Mobile Malware Evolution: An Overview, Part 3, Securelist (2009), Accessed: 30 March 2012
-
Securelist, Mobile Malware Evolution: An Overview, Part 3, Securelist, http://www. securelist. com/en/analysis?pubid=204792080 (2009), Accessed: 30 March 2012.
-
-
-
-
27
-
-
77953137615
-
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
-
Shabtai, A., Kanonov, U., Elovici, Y.: Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw. 83(8), 1524-1537 (2010).
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
28
-
-
33749046067
-
Towards adaptive anomaly detection in cellular mobile networks
-
Sun, B., Chen, Z., Wang, R., Yu, F., Leung, V. C. M.: Towards adaptive anomaly detection in cellular mobile networks. In: the IEEE Consumer Communications and Networking Conference, vol. 2, pp. 666-670 (2006).
-
(2006)
In: the IEEE Consumer Communications and Networking Conference
, vol.2
, pp. 666-670
-
-
Sun, B.1
Chen, Z.2
Wang, R.3
Yu, F.4
Leung, V.C.M.5
-
29
-
-
11244286137
-
-
Sun, B., Yu, F., Wu, K., Leung, V. C. M.: Mobility-based anomaly detection in cellular mobile networks. In: Proceedings of ACM Wireless Security (WiSe 04), pp. 61-69 (2004).
-
(2004)
Mobility-based anomaly detection in cellular mobile networks. In: Proceedings of ACM Wireless Security (WiSe 04)
, pp. 61-69
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Leung, V.C.M.4
-
30
-
-
84901221014
-
-
Which?, 13. 5 million UK mobile phone users at risk of fraud, Which? Tech Daily Accessed: 31 July 2012
-
Which?, 13. 5 million UK mobile phone users at risk of fraud, Which? Tech Daily, http://blogs. which. co. uk/mobile/mobile-phones/13-5-million-uk-mobile-phone-users-at-risk-of-fraud/ (2011), Accessed: 31 July 2012.
-
(2011)
-
-
-
32
-
-
42749101361
-
The MIT mobile device speaker verification corpus: data collection and preliminary experiments
-
Woo, R., Park, A., Hazen. T.: The MIT mobile device speaker verification corpus: data collection and preliminary experiments. In: Speaker and Language Recognition Workshop, pp. 1-6 (2006).
-
(2006)
Speaker and Language Recognition Workshop
, pp. 1-6
-
-
Woo, R.1
Park, A.2
Hazen, T.3
|