Temporal sequence learning and data reduction for anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Cellular security: better, but foes still lurk
IEEE Spectrum
A New Location Management Strategy Based on User Mobility Pattern for Wireless Networks
LCN '02 Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Profile-Based Protocols in Wireless Mobile Ad Hoc Networks
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
Physically Locating Wireless Intruders
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Mobility-based anomaly detection in cellular mobile networks
Proceedings of the 3rd ACM workshop on Wireless security
IDAMN: an intrusion detection architecture for mobile networks
IEEE Journal on Selected Areas in Communications
Location management for next-generation personal communications networks
IEEE Network: The Magazine of Global Internetworking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
An Incentive-Based Secure Charging Scheme for Integrating Networks
Computer Supported Cooperative Work in Design IV
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
IEEE Transactions on Wireless Communications
Physical-layer intrusion detection in wireless networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Composite trust-based public key management in mobile ad hoc networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio Frequency Fingerprinting and User Mobility Profiles and discuss details of our methodologies for building enhanced intrusion detection systems for future wireless and mobile networks.