Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers

Research Article

Efficient Intrusion Detection for Mobile Devices Using Spatio-temporal Mobility Patterns

Download
394 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29154-8_35,
        author={Sausan Yazji and Robert Dick and Peter Scheuermann and Goce Trajcevski},
        title={Efficient Intrusion Detection for Mobile Devices Using Spatio-temporal Mobility Patterns},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2012},
        month={10},
        keywords={},
        doi={10.1007/978-3-642-29154-8_35}
    }
    
  • Sausan Yazji
    Robert Dick
    Peter Scheuermann
    Goce Trajcevski
    Year: 2012
    Efficient Intrusion Detection for Mobile Devices Using Spatio-temporal Mobility Patterns
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-642-29154-8_35
Sausan Yazji1, Robert Dick2, Peter Scheuermann1, Goce Trajcevski1
  • 1: Northwestern University
  • 2: University of Michigan

Abstract

Mobile phones are ubiquitous and are used for email, text messages, navigation, education, and as a pyment tool (e.g., Mobile Money - extensively used in China and Japan [1]). Consequently, mobile devices carry a lot of personal data and, if stolen, that data can be more important than the loss of the device.