2002
DOI: 10.1006/jpdc.2002.1857
|View full text |Cite
|
Sign up to set email alerts
|

Behavior-Based Intrusion Detection in Mobile Phone Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2002
2002
2022
2022

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 53 publications
(29 citation statements)
references
References 7 publications
0
29
0
Order By: Relevance
“…The weekday feature was calculated by using the day feature; as people's activity on different weekdays could be different [4] [12]. A Radial Basis Network (RBF) was utilised in favour of other approaches given its previous success in [4] [7]. The configuration of which was iteratively modified to optimise performance.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The weekday feature was calculated by using the day feature; as people's activity on different weekdays could be different [4] [12]. A Radial Basis Network (RBF) was utilised in favour of other approaches given its previous success in [4] [7]. The configuration of which was iteratively modified to optimise performance.…”
Section: Methodsmentioning
confidence: 99%
“…Any deviation between the current calling session and the historical profile that exceeds a threshold, is identified as an intrusion. Several studies were proposed by using this procedure, such as the European ASPECT (Advanced Security for Personal Communication Technologies) project [5], [6], and [7].…”
Section: Behaviour Based Mobile Idsmentioning
confidence: 99%
“…This is used to determine a more generalized projection of the vehicle's movement. Determining this generalized path is done with a similar learning method described by A. Boukerche et al [87,108] These two operations are conducted separately, as done in [30], except the pattern matching approach will sometimes use the movement projection's predicted AP to help differentiate between similar pattern predictions. By including some overlap between the two prediction methods, the prediction is more informed and accuracy is improved.…”
Section: Pattern Matching and Hybridmentioning
confidence: 99%
“…Vice versa particular services or operations might be utilized in public areas or correspondingly high risk locations, allowing immediate yet discrete security adjustments to be made. This is achievable via the adaptation of behavior based identification techniques [25].…”
Section: Device Interactionmentioning
confidence: 99%