Abstract—The complexity of cellular mobile systems renders prevention-based techniques not adequate to guard against all potential attacks. An intrusion detection system has become an indispensable component to provide defense-in-depth security mechanisms for wireless networks. In this paper, by exploiting regularities demonstrated in users ’ behaviors, we present a suite of detection techniques to identify fraudulent usage of mobile telecommunication services. Specifically, we explore users ’ behav-iors in terms of calling and mobility activities because they are two of the most important components of mobile users ’ profiles. To utilize users ’ calling activities, we formulate the intrusion de-tection problem as a multifeature two-class p...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
: This paper discusses the status of research on detection of fraud undertaken as part of the Europe...
The points being approached in this paper are: the problem of detecting unusual changes of consumpti...
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
The increasing complexity of cellular radio networks yields new demands concerning network security....
Mobile devices have evolved and experienced an immense popularity over the last few years. This grow...
Fraud detection is an important application, since network operators lose a relevant portion of thei...
In recent years, wireless technologies are increasingly adopted in many application domains that wer...
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a la...
This dissertation looks at how we can characterise a IEEE 802.11 wireless net-work. When analysing w...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
Abstract: Mobile devices such as smart phones and laptops are in common use and carry a vast amount ...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
This thesis presents a research whose objective is to design an intrusion detection model for Mobile...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
: This paper discusses the status of research on detection of fraud undertaken as part of the Europe...
The points being approached in this paper are: the problem of detecting unusual changes of consumpti...
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
The increasing complexity of cellular radio networks yields new demands concerning network security....
Mobile devices have evolved and experienced an immense popularity over the last few years. This grow...
Fraud detection is an important application, since network operators lose a relevant portion of thei...
In recent years, wireless technologies are increasingly adopted in many application domains that wer...
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a la...
This dissertation looks at how we can characterise a IEEE 802.11 wireless net-work. When analysing w...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
Abstract: Mobile devices such as smart phones and laptops are in common use and carry a vast amount ...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
This thesis presents a research whose objective is to design an intrusion detection model for Mobile...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
: This paper discusses the status of research on detection of fraud undertaken as part of the Europe...
The points being approached in this paper are: the problem of detecting unusual changes of consumpti...