MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "9bdbe7d4-40d9-4f12-8566-4f121d28c724"}, "_deposit": {"id": "4129", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4129"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4129", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Anomalous Behavior Detection in Mobile Network", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "New security threats emerge against mobiledevices as the devices’ computing power and storagecapabilities evolve. Preventive mechanisms likeauthentication, encryption alone are not sufficient toprovide adequate security for a system. There is adefinite need for Anomaly detection systems that willimprove security on the mobile phone. In this work, wepropose User Group Partition Algorithm and BehaviorPattern Matching Algorithm to extract anomalous callsfrom mobile call detail records effectively."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "5.Anomalous Behavior Detection in Mobile Network.pdf", "filesize": [{"value": "166 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 166000.0, "url": {"url": "https://meral.edu.mm/record/4129/files/5.Anomalous Behavior Detection in Mobile Network.pdf"}, "version_id": "81962f1c-01e4-4616-93bb-c23218b803f3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Ko, Mon Mon"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/183"}, "item_title": "Anomalous Behavior Detection in Mobile Network", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004129", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4129", "relation": {}, "relation_version_is_last": true, "title": ["Anomalous Behavior Detection in Mobile Network"], "weko_shared_id": -1}
Anomalous Behavior Detection in Mobile Network
http://hdl.handle.net/20.500.12678/0000004129
http://hdl.handle.net/20.500.12678/0000004129a47b0b71-a389-433f-92ac-c1baa573c37b
9bdbe7d4-40d9-4f12-8566-4f121d28c724
Name / File | License | Actions |
---|---|---|
5.Anomalous Behavior Detection in Mobile Network.pdf (166 Kb)
|
|