Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "9bdbe7d4-40d9-4f12-8566-4f121d28c724"}, "_deposit": {"id": "4129", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4129"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4129", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Anomalous Behavior Detection in Mobile Network", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "New security threats emerge against mobiledevices as the devices’ computing power and storagecapabilities evolve. Preventive mechanisms likeauthentication, encryption alone are not sufficient toprovide adequate security for a system. There is adefinite need for Anomaly detection systems that willimprove security on the mobile phone. In this work, wepropose User Group Partition Algorithm and BehaviorPattern Matching Algorithm to extract anomalous callsfrom mobile call detail records effectively."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "5.Anomalous Behavior Detection in Mobile Network.pdf", "filesize": [{"value": "166 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 166000.0, "url": {"url": "https://meral.edu.mm/record/4129/files/5.Anomalous Behavior Detection in Mobile Network.pdf"}, "version_id": "81962f1c-01e4-4616-93bb-c23218b803f3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Ko, Mon Mon"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/183"}, "item_title": "Anomalous Behavior Detection in Mobile Network", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004129", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4129", "relation": {}, "relation_version_is_last": true, "title": ["Anomalous Behavior Detection in Mobile Network"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Anomalous Behavior Detection in Mobile Network

http://hdl.handle.net/20.500.12678/0000004129
http://hdl.handle.net/20.500.12678/0000004129
a47b0b71-a389-433f-92ac-c1baa573c37b
9bdbe7d4-40d9-4f12-8566-4f121d28c724
None
Preview
Name / File License Actions
5.Anomalous 5.Anomalous Behavior Detection in Mobile Network.pdf (166 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:11:07.765085
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL