New security threats emerge against mobiledevices as the devices’ computing power and storagecapabilities evolve. Preventive mechanisms likeauthentication, encryption alone are not sufficient toprovide adequate security for a system. There is adefinite need for Anomaly detection systems that willimprove security on the mobile phone. In this work, wepropose User Group Partition Algorithm and BehaviorPattern Matching Algorithm to extract anomalous callsfrom mobile call detail records effectively
In the competitive telecommunications market, the information that the mobile telecom operators can ...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
In the competitive telecommunications market, the information that the mobile telecom operators can ...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
The increasing complexity of cellular radio networks yields new demands concerning network security....
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
Due to the increasing level of utilization, smartphones are commonly used in enterprise environments...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
In this report we present a rule-based approach to detect anomalous telephone calls. The method desc...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
Abstract—The complexity of cellular mobile systems renders prevention-based techniques not adequate ...
Abstract With the popularization of smartphones, they have become the main target of malicious appli...
International audienceAnalysing mobile apps communications can unleash significant information on bo...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
International audienceA mobile operator offers many mobile data communication services to its users,...
In the competitive telecommunications market, the information that the mobile telecom operators can ...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
In the competitive telecommunications market, the information that the mobile telecom operators can ...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
The increasing complexity of cellular radio networks yields new demands concerning network security....
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
Due to the increasing level of utilization, smartphones are commonly used in enterprise environments...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
In this report we present a rule-based approach to detect anomalous telephone calls. The method desc...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
Abstract—The complexity of cellular mobile systems renders prevention-based techniques not adequate ...
Abstract With the popularization of smartphones, they have become the main target of malicious appli...
International audienceAnalysing mobile apps communications can unleash significant information on bo...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
International audienceA mobile operator offers many mobile data communication services to its users,...
In the competitive telecommunications market, the information that the mobile telecom operators can ...
Recent studies have shown that a number of network attacks that were used to target mainframes and p...
In the competitive telecommunications market, the information that the mobile telecom operators can ...