{"created":"2020-09-01T14:11:05.296583+00:00","id":4129,"links":{},"metadata":{"_buckets":{"deposit":"9bdbe7d4-40d9-4f12-8566-4f121d28c724"},"_deposit":{"id":"4129","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4129"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4129","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Anomalous Behavior Detection in Mobile Network","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"New security threats emerge against mobiledevices as the devices’ computing power and storagecapabilities evolve. Preventive mechanisms likeauthentication, encryption alone are not sufficient toprovide adequate security for a system. There is adefinite need for Anomaly detection systems that willimprove security on the mobile phone. In this work, wepropose User Group Partition Algorithm and BehaviorPattern Matching Algorithm to extract anomalous callsfrom mobile call detail records effectively."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"5.Anomalous Behavior Detection in Mobile Network.pdf","filesize":[{"value":"166 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4129/files/5.Anomalous Behavior Detection in Mobile Network.pdf"},"version_id":"81962f1c-01e4-4616-93bb-c23218b803f3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Thirteenth International Conferences on Computer Applications(ICCA 2015)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Ko, Mon Mon"},{"subitem_authors_fullname":"Thwin, Mie Mie Su"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015-02-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/183"},"item_title":"Anomalous Behavior Detection in Mobile Network","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4129","relation_version_is_last":true,"title":["Anomalous Behavior Detection in Mobile Network"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:51:45.914156+00:00"}