Anomaly detection in cellular Machine-to-Machine communications
暂无分享,去创建一个
[1] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[2] Chen Hongsong,et al. Security and trust research in M2M system , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.
[3] Roger Piqueras Jover,et al. How an SMS-based malware infection will get throttled by the wireless link , 2012, 2012 IEEE International Conference on Communications (ICC).
[4] Antonio F. Gómez-Skarmeta,et al. An Architecture Based on Internet of Things to Support Mobility and Security in Medical Environments , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[5] S. Uryasev,et al. Drawdown Measure in Portfolio Optimization , 2003 .
[6] Jaydip Sen,et al. Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.
[7] Michael Starsinic. System architecture challenges in the home M2M network , 2010, 2010 IEEE Long Island Systems, Applications and Technology Conference.
[8] More than 50 billion connected devices , 2011 .
[9] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[10] I. Jolliffe. Principal Component Analysis , 2002 .
[11] Sachin Agarwal,et al. Operator-based over-the-air M2M wireless sensor network security , 2010, 2010 14th International Conference on Intelligence in Next Generation Networks.