{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:19:09Z","timestamp":1774538349982,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319232065","type":"print"},{"value":"9783319232072","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-23207-2_15","type":"book-chapter","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T07:37:30Z","timestamp":1441265850000},"page":"147-155","source":"Crossref","is-referenced-by-count":3,"title":["Anomalous Behavior Detection in Mobile Network"],"prefix":"10.1007","author":[{"given":"Mon Mon","family":"Ko","sequence":"first","affiliation":[]},{"given":"Mie Mie","family":"Su Thwin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,4]]},"reference":[{"issue":"6","key":"15_CR1","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s00779-005-0348-5","volume":"9","author":"AH Artail","year":"2005","unstructured":"Artail, A.H., Raydan, M.: Device-aware desktop web page transformation for rendering on handhelds. Personal and Ubiquitous Computing 9(6), 368\u2013380 (2005). doi: 10.1007\/s00779-005-0348-5","journal-title":"Personal and Ubiquitous Computing"},{"key":"15_CR2","unstructured":"Chow, G.W., Jones, A.: A framework for anomalydetection in OKL4-linux based smartphones. In: Proceedings of the 6th Australian Information Security Management Conference (2008)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Sun, B., Chen, Z., Wang, R., Yu, F., Leung, V.C.M.: Towards adaptive anomaly detection in cellular mobile networks. In: Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC 2006), vol. 2, pp. 666\u2013670 (2006)","DOI":"10.1109\/CCNC.2006.1593121"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Sun, B., Xiao, Y., Wu, K.: Intrusion Detection in Cellular Mobile Networks. Book chapter in Wireless Mobile Network Security, pp. 183\u2013210. Springer (2007). ISBN: 0387280405","DOI":"10.1007\/978-0-387-33112-6_8"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Naumann, I., Hogben, G., Fritsch, L., Benito, R., Dean, R.: Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID). European Network and information Security Agency (ENISA), January (2008)","DOI":"10.1016\/S1353-4858(08)70097-7"},{"key":"15_CR6","unstructured":"GSM. World Mobile. Market Data Summary (Q22009). http:\/\/www.gsmworld.com\/newsroom\/market-ata\/market_data_summary.htm (accessed 16 Feb. 2011)"},{"key":"15_CR7","unstructured":"Mobile World Congress. Visit Kaspersky Lab at Mobile World Congress 2009 in Barcelona. http:\/\/www.kaspersky.com\/news?id=207575745 (accessed 16 Feb. 2011)"},{"key":"15_CR8","unstructured":"Landesman, M.: The World\u2019s Largest Security Analysis of Real-World Web Traffic, Annual Global Threat Report, ScanSafe STAT. http:\/\/www.scansafe.com\/downloads\/gtr\/2009_AGTR.pdf (accessed 16 Feb. 2011)"},{"key":"15_CR9","unstructured":"Ray, B.: Home Office discusses thief-proof phones. http:\/\/www.theregister.co.uk\/2007\/05\/25\/home_office_phone_crime (accessed 16 Feb. 2011)"},{"key":"15_CR10","unstructured":"Kruegel, C., Valeur, F., Vigna, G.: Intrusion Detection and Correlation: Challenges and Solutions. Book chapter Computer security and Intrusion Detection. Springer (2005)"},{"key":"15_CR11","unstructured":"Singh, K.K.: Hybrid Profiling Strategy for Intrusion Detection, Department of Computer Science. University of British Columbia (2004)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1007\/BFb0020294","volume-title":"Artificial Neural Networks - ICANN\u201997","author":"Y Moreau","year":"1997","unstructured":"Moreau, Y., Verrelst, H., Vandewalle, J.: Detection of mobile phone fraud using supervised neural networks: a first prototype. In: Gerstner, W., Hasler, M., Germond, A., Nicoud, J.-D. (eds.) ICANN 1997. LNCS, vol. 1327, pp. 1065\u20131070. Springer, Heidelberg (1997)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Buschkes, D., Kesdogan, R., Reichl, P.: How to increase security in mobile networks by anomaly detection. In: Proceedings of the Computer Security Applications Conference, Phoenix, pp. 3\u201312, December 1998","DOI":"10.1109\/CSAC.1998.738558"},{"issue":"9","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1006\/jpdc.2002.1857","volume":"62","author":"A Boukerche","year":"2002","unstructured":"Boukerche, A., Notare, M.S.M.A.: Behavior-Based Intrusion Detection in Mobile Phone Systems. Journal Of Parallel and Distributed Computing 62(9), 1476\u20131490 (2002)","journal-title":"Journal Of Parallel and Distributed Computing"},{"key":"15_CR15","unstructured":"Hollm\u00e9n, J.: User profiling and classification for fraud detection in mobile communications networks, PhD Thesis, Helsinki University of Technology (2000)"},{"issue":"7","key":"15_CR16","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1006\/jpdc.2000.1720","volume":"61","author":"P Burge","year":"2001","unstructured":"Burge, P., Shawe-Tylor, J.: An unsupervised neural network approach profiling the behavior of mobile phone users for use in fraud detection. Journal of Parallel and Distributed Computing 61(7), 915\u2013925 (2001)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Sun, B., Yu, F., Wu, K., Leung,V.C.M.: Mobilitybased anomaly detection in cellular mobile networks. In: Proceedings of the ACM Wireless Security (WiSe 2004), Philadelphia, PA, pp. 61\u201369 (2004)","DOI":"10.1145\/1023646.1023658"},{"key":"15_CR18","unstructured":"Kumpulainen, P., Htnen, K.: Anomaly Detection Algorithm Test Bench for Mobile Network Management. Tampere University of Technology (2008)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), USA, June 2008","DOI":"10.1145\/1378600.1378626"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-04342-0_13","volume-title":"Recent Advances in Intrusion Detection","author":"L Liu","year":"2009","unstructured":"Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: preventing your cellphone from spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 244\u2013264. Springer, Heidelberg (2009)"}],"container-title":["Advances in Intelligent Systems and Computing","Genetic and Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23207-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T11:36:25Z","timestamp":1748604985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23207-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,4]]},"ISBN":["9783319232065","9783319232072"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23207-2_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,4]]}}}