Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
- 27 March 2010
- journal article
- Published by Elsevier BV in Journal of Systems and Software
- Vol. 83 (8), 1524-1537
- https://doi.org/10.1016/j.jss.2010.03.046
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- From desktop to mobile: Examining the security experienceComputers & Security, 2009
- Keystroke dynamics-based authentication for mobile devicesComputers & Security, 2009
- Detecting energy-greedy anomalies and mobile malware variantsPublished by Association for Computing Machinery (ACM) ,2008
- Behavioral detection of malware on mobile handsetsPublished by Association for Computing Machinery (ACM) ,2008
- Mobile Device Profiling and Intrusion Detection Using Smart BatteriesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- SmartSirenPublished by Association for Computing Machinery (ACM) ,2007
- Denial-of-service attacks on battery-powered mobile computersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Enhancing profiles for anomaly detection using time granularities1Journal of Computer Security, 2002
- Temporal sequence learning and data reduction for anomaly detectionACM Transactions on Information and System Security, 1999
- Maintaining knowledge about temporal intervalsCommunications of the ACM, 1983