Back to Results
First PageMeta Content
Neural networks / Erol Gelenbe / Random neural network / Data security / Mobile telecommunications / Intrusion detection system / Malware / Network security / SMS / Technology / Mobile technology / Electronics


Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant
Add to Reading List

Document Date: 2013-07-02 14:44:03


Open Document

File Size: 116,66 KB

Share Result on Facebook

City

Saint-Malo / Austin / Boston / Los Angeles / Alexandria / Toronto / Melbourne / London / San Diego / Chicago / /

Company

Arbor Networks / Zonouz S.A. / Google / Cisco / BBC / Rethink Wireless / /

Country

France / Canada / Australia / United Kingdom / /

/

Event

Natural Disaster / /

Facility

Imperial College / /

Holiday

New Year's Day / /

IndustryTerm

simulation tools / on their networks / anomaly detection algorithms / attacks targeting services / real mobile networks / cellular networks / Internet-based attacks / recurrent random neural network / mobile communications / distributed processing / hidden explosive devices / self-aware networks / wireless network / wireless communication network / intrusion detection systems / communication systems / neural networks / change detection algorithm / network-based security solution / control-plane protocols / computational tools / operational networks / wireless networks / 4G technologies / given network / energy costs / mobile operator / real-time and offline anomaly detection methods / random neural network / remote server / normal mobile communications / large cellular network / visual networking index / product form solution / cellular devices / analytical and numerical solutions / off-theshelf malware creation tools / clustering algorithm / 3G networks / 3G cellular networks / 3G/4G wireless networks / broadband Internet access / cellular network / radio resource management / voice and data / communication network / call management / 4G capable devices / mirror server / security solutions / leverage existing complex security solutions / /

Movie

A.D. / /

OperatingSystem

Android / DoS / /

Organization

B. Oklander Department of Electrical & Electronic Engineering / Kaspersky Lab / IMC / Imperial College / European Union / IEEE Computer Society / /

Technology

change detection algorithm / broadband / anomaly detection algorithms / SMS / 4G technologies / smart phones / Smartphone / clustering algorithm / mobile phones / Android / mobile device / operating systems / packet-switched / mobile devices / encryption / control-plane protocols / Neural Network / DNS / smartphones / HTTP / paging / simulation / VOIP / 3G / flash / /

SocialTag