2015
DOI: 10.1016/j.pmcj.2014.10.007
|View full text |Cite
|
Sign up to set email alerts
|

Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation

Abstract: Many security problems in smartphones and other smart devices are approached from an anomaly detection perspective in which the main goal reduces to identifying anomalous activity patterns. Since machine learning algorithms are generally used to build such detectors, one major challenge is adapting these techniques to battery-powered devices. Many recent works simply assume that on-platform detection is prohibitive and suggest using offloaded (i.e., cloud-based) engines. Such a strategy seeks to save battery l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 31 publications
(48 reference statements)
0
13
0
Order By: Relevance
“…Additionally, the measurement is performed for three popular applications. These applications are selected from three categories of popular activities: games, online social networking, and multimedia [52].…”
Section: Efficiencymentioning
confidence: 99%
“…Additionally, the measurement is performed for three popular applications. These applications are selected from three categories of popular activities: games, online social networking, and multimedia [52].…”
Section: Efficiencymentioning
confidence: 99%
“…For these scenarios, it is impractical to wait until location data corresponding to a full trajectory is sampled, given that the immediate detection of relevant events would be discarded. Moreover, such issue is framed in a more global dilemma about the optimality of MCC oriented strategies for solving any mobile computing need [22]. Several guidelines for defining when to perform computation offloading have been proposed and studied [23,24], which raises the question of whether an MCC approach is optimal for any combination of computation, latency and tracking accuracy requirements.…”
Section: Introductionmentioning
confidence: 99%
“…More importantly, they come with a limited power supply, which incited developers to study the battery life [5], construct energy and power consumption models [6][7][8], and closely follow the influence of user actions and applications on power consumption [9]. Furthermore, studying the embedded systems' power profile has led to improving energy efficiency [10], reliability [11,12], and also monitoring and detecting anomalies [13][14][15] and energy hogs [16].…”
Section: Power Consumption Modeling In Embedded Socsmentioning
confidence: 99%