{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:43:47Z","timestamp":1743057827170,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319226347"},{"type":"electronic","value":"9783319226354"}],"license":[{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-22635-4_10","type":"book-chapter","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T14:44:03Z","timestamp":1438613043000},"page":"115-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A BRPCA Based Approach for Anomaly Detection in Mobile Networks"],"prefix":"10.1007","author":[{"given":"Stavros","family":"Papadopoulos","sequence":"first","affiliation":[]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Dimitriou","sequence":"additional","affiliation":[]},{"given":"Omer H.","family":"Abdelrahman","sequence":"additional","affiliation":[]},{"given":"Gokce","family":"Gorbil","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,4]]},"reference":[{"key":"10_CR1","unstructured":"Bishop, C.M.: Pattern recognition and machine learning, vol. 1. Springer, Berlin (2006)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Borgaonkar, R., Redon, K., Seifert, J.P.: Security analysis of a femtocell device. In: Proceedings of 4th International Conference on Security of Information and Networks (SIN), pp. 95\u2013102. ACM, Sydney (2011)","DOI":"10.1145\/2070425.2070442"},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. SIGMOD Rec. 29(2), 93\u2013104 (2000)","journal-title":"SIGMOD Rec."},{"issue":"5","key":"10_CR4","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1002\/nem.747","volume":"20","author":"A D\u2019Alconzo","year":"2010","unstructured":"D\u2019Alconzo, A., Coluccia, A., Romirer-Maierhofer, P.: Distribution-based anomaly detection in 3G mobile networks: from theory to practice. Int. J. Netw. Manag. 20(5), 245\u2013269 (2010)","journal-title":"Int. J. Netw. Manag."},{"key":"10_CR5","unstructured":"David, S., Harrison, D., Price, R., Fretheim, S.: Do-it-yourself cellular intrusion detection system. LMG Security, http:\/\/lmgsecurity.com\/whitepapers\/DIY-Cellular-IDS_2013-08-01.pdf (2013)"},{"issue":"10","key":"10_CR6","doi-asserted-by":"publisher","first-page":"9899","DOI":"10.1016\/j.eswa.2012.02.053","volume":"39","author":"SJ Delany","year":"2012","unstructured":"Delany, S.J., Buckley, M., Greene, D.: SMS spam filtering: methods and data. Exp. Syst. Appl. 39(10), 9899\u20139908 (2012)","journal-title":"Exp. Syst. Appl."},{"issue":"12","key":"10_CR7","doi-asserted-by":"publisher","first-page":"3419","DOI":"10.1109\/TIP.2011.2156801","volume":"20","author":"X Ding","year":"2011","unstructured":"Ding, X., He, L., Carin, L.: Bayesian robust principal component analysis. IEEE Trans. Image Process. 20(12), 3419\u20133430 (2011)","journal-title":"IEEE Trans. Image Process."},{"key":"10_CR8","unstructured":"Golde, N., Redon, K., Borgaonkar, R.: Weaponizing femtocells: the effect of rogue devices on mobile telecommunications. In: Proceedings of NDSS, pp. 1\u201316 (2012)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Gorbil, G., Abdelrahman, O.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of RRC-based signalling storms in 3G networks. IEEE Trans. Emerg. Topics Comput PP(99), 1 (2015)","DOI":"10.1109\/TETC.2015.2389662"},{"key":"10_CR10","unstructured":"Jolliffe, I.T.: Principal Component Analysis, 2nd edn. Springer, Berlin (2002)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Joshi, S.S., Phoha, V.V.: Investigating hidden Markov models capabilities in anomaly detectio. In: Proceedings of 43rd Annual Southeast Regional Conference, vol. 1, pp. 98\u2013103. ACM, Kennesaw (2005)","DOI":"10.1145\/1167350.1167387"},{"key":"10_CR12","first-page":"76","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"Eun Kyoung Kim","year":"2013","unstructured":"Kim, E.K., McDaniel, P., La Porta, T.: A detection mechanism for SMS flooding attacks in cellular networks. In: Security and Privacy in Communication Networks, vol. 106, pp. 76\u201393. Springer, Berlin (2013)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Lee, P.P.C., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G wireless networks. In: Proceedings of INFOCOM, pp. 1289\u20131297. IEEE, Alaska (2007)","DOI":"10.1109\/INFCOM.2007.153"},{"issue":"15","key":"10_CR14","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1016\/j.comnet.2009.05.008","volume":"53","author":"PPC Lee","year":"2009","unstructured":"Lee, P.P.C., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G\/WiMax wireless networks. Comput. Netw. 53(15), 2601\u20132616 (2009)","journal-title":"Comput. Netw."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Liebergeld, S., Lange, M., Borgaonkar, R.: Cellpot: a concept for next generation cellular network honeypots. In: Proceedings of NDSS, pp. 1\u20136 (2014)","DOI":"10.14722\/sent.2014.23005"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L Rabiner","year":"1989","unstructured":"Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257\u2013286 (1989)","journal-title":"Proc. IEEE"},{"key":"10_CR17","unstructured":"Strang, G.: Linear Algebra and its Applications, 4th edn. Brooks\/Cole (2006)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Traynor, P., et al.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of 16th Conference Computer and Communications Security (CCS), pp. 223\u2013234. ACM, Chicago (2009)","DOI":"10.1145\/1653662.1653690"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Wang, F., et al.: A HMM-based method for anomaly detection. In: Proceedings of 4th International Conference on Broadband Network and Multimedia Technology, pp. 276\u2013280. IEEE, Shenzhen (2011)","DOI":"10.1109\/ICBNMT.2011.6155940"},{"key":"10_CR20","first-page":"202","volume-title":"Lecture Notes in Computer Science","author":"Guanhua Yan","year":"2009","unstructured":"Yan, G., Eidenbenz, S., Galli, E.: SMS-Watchdog: Profiling social behaviors of sms users for anomaly detection. In: Proceedings of 12th International Symposium Recent Advances in Intrusion Detection (RAID), pp. 202\u2013223. Springer, Saint-Malo (2009)"}],"container-title":["Lecture Notes in Electrical Engineering","Information Sciences and Systems 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22635-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T18:00:32Z","timestamp":1674237632000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22635-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,4]]},"ISBN":["9783319226347","9783319226354"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22635-4_10","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015,8,4]]},"assertion":[{"value":"4 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}