SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection
暂无分享,去创建一个
[1] Victor C. M. Leung,et al. Enhancing security using mobility-based anomaly detection in cellular mobile networks , 2006, IEEE Trans. Veh. Technol..
[2] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[3] Guanhua Yan,et al. Mobi-watchdog: you can steal, but you can't run! , 2009, WiSec '09.
[4] Songwu Lu,et al. Analysis of the Reliability of a Nationwide Short Message Service , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] Volker Tresp,et al. Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[6] Ke Wang,et al. Behavior-based modeling and its application to Email analysis , 2006, TOIT.
[7] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[8] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..
[9] A. B. Davis,et al. Knowledge-based management of cellular clone fraud , 1992, [1992 Proceedings] The Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[10] Songwu Lu,et al. A study of the short message service of a nationwide cellular network , 2006, IMC '06.
[11] Tom Fawcett,et al. Activity monitoring: noticing interesting changes in behavior , 1999, KDD '99.
[12] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[14] Guanhua Yan,et al. Catching Instant Messaging Worms with Change-Point Detection Techniques , 2008, LEET.
[15] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[16] Thomas F. La Porta,et al. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.
[17] Deepak Venugopal,et al. A Malware Signature Extraction and Detection Method Applied to Mobile Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[18] Diane J. Cook,et al. Graph-based anomaly detection , 2003, KDD '03.
[19] Yi-Bing Lin,et al. Wireless and Mobile Network Architectures , 2000 .
[20] Lillian Lee,et al. Measures of Distributional Similarity , 1999, ACL.