The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- and outsiders becomes more and more difficult. This paper deals with a relatively new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on profiling mobile users. Mobility pattern generation and behavior prediction are discussed in depth, before a new model of anomaly detection that is based on the Bayes decision rule is introduced. Applying this model to mobile user profiles proves the feasibility of our approach. Finally, a special emphasis is put on discussing privacy aspects of anomaly detection
Mobile devices have become essential to modern society; however, as their popularity has grown, so h...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
ABSTRACT The goal of this research project is to design and implement a mobile application and mach...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
Abstract—The complexity of cellular mobile systems renders prevention-based techniques not adequate ...
<p>As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based ser...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
Mobile devices have evolved and experienced an immense popularity over the last few years. This grow...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
The paper describes an implementation of a behavioral authentication system, working on sparse geogr...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
International audienceIn order to help the network maintainers with the daily diagnosis and optimiza...
Mobile devices have become essential to modern society; however, as their popularity has grown, so h...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
ABSTRACT The goal of this research project is to design and implement a mobile application and mach...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
Abstract—The complexity of cellular mobile systems renders prevention-based techniques not adequate ...
<p>As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based ser...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
Mobile devices have evolved and experienced an immense popularity over the last few years. This grow...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
The paper describes an implementation of a behavioral authentication system, working on sparse geogr...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
International audienceIn order to help the network maintainers with the daily diagnosis and optimiza...
Mobile devices have become essential to modern society; however, as their popularity has grown, so h...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
ABSTRACT The goal of this research project is to design and implement a mobile application and mach...