Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
- 16 June 2011
- journal article
- Published by Wiley in Security and Communication Networks
- Vol. 5 (1), 3-14
- https://doi.org/10.1002/sec.341
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- VirusMeter: Preventing Your Cellphone from SpiesLecture Notes in Computer Science, 2009
- Privacy features of European eID card specificationsNetwork Security, 2008
- Intrusion Detection in Cellular Mobile NetworksPublished by Springer Science and Business Media LLC ,2007
- Top 10 algorithms in data miningKnowledge and Information Systems, 2007
- An introduction to ROC analysisPattern Recognition Letters, 2005
- Device-aware desktop web page transformation for rendering on handheldsPersonal and Ubiquitous Computing, 2005
- Behavior-Based Intrusion Detection in Mobile Phone SystemsJournal of Parallel and Distributed Computing, 2002
- An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in Fraud DetectionJournal of Parallel and Distributed Computing, 2001
- Random ForestsMachine Learning, 2001
- Methods for Protecting Password TransmissionComputers & Security, 2000