[
    {
        "key": "FQ4RTUGG",
        "version": 59,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/FQ4RTUGG",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/FQ4RTUGG",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/JECUR7QB",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "FQ4RTUGG",
            "version": 59,
            "parentItem": "JECUR7QB",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "Rui Zhang et al. - 2014 - The security analysis and improvements of link con.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Rui Zhang et al. - 2014 - The security analysis and improvements of link con.pdf",
            "md5": "2553df12ce898fd794a4a17dee766fee",
            "mtime": 1411348706240,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-22T01:18:24Z",
            "dateModified": "2014-09-22T01:18:24Z"
        }
    },
    {
        "key": "JECUR7QB",
        "version": 57,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/JECUR7QB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/JECUR7QB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Rui Zhang et al.",
            "parsedDate": "2014-06",
            "numChildren": 1
        },
        "data": {
            "key": "JECUR7QB",
            "version": 57,
            "itemType": "journalArticle",
            "title": "The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Rui Zhang"
                },
                {
                    "creatorType": "author",
                    "name": "Jian Wei Wang"
                },
                {
                    "creatorType": "author",
                    "name": "Yaobin Xie"
                },
                {
                    "creatorType": "author",
                    "name": "Lizhong Wang"
                }
            ],
            "abstractNote": "The development of mobile communication technology has become a dazzling star in the information field. Especially for the third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, with wide application prospects and potential economic value. Bluetooth mobile phone is incredibly good at connecting wirelessly to other terminal equipments and transferring data between devices very near each other. Meanwhile, the security of mobile phone Bluetooth transmission becomes the concern of the current users, and ensuring the security of Mobile phone Bluetooth transmission is also a problem to be solved urgently. In this paper, the file transport mechanism of Mobile phone Bluetooth is the main research object. Based on link protocol, using the security analysis of link connection mechanism, this paper improved the Personal Identification Number (PIN) input from the user interface, in order to enhancing the security of link connection mechanism of the underlying file transfer protocol.",
            "publicationTitle": "Journal of Chemical & Pharmaceutical Research",
            "publisher": "",
            "place": "",
            "date": "June 2014",
            "volume": "6",
            "issue": "6",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "1380-1386",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Journal of Chemical & Pharmaceutical Research",
            "DOI": "",
            "citationKey": "",
            "url": "http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=97004861&site=ehost-live",
            "accessDate": "2014-09-22T01:14:43Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "09757384",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "EBSCOhost",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "BLUETOOTH technology"
                },
                {
                    "tag": "CELL phones -- Security measures"
                },
                {
                    "tag": "CYBERTERRORISM"
                }
            ],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T01:18:14Z",
            "dateModified": "2014-09-22T01:18:14Z"
        }
    },
    {
        "key": "Z8XZW5EB",
        "version": 55,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/Z8XZW5EB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/Z8XZW5EB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Thaanum",
            "parsedDate": "2013-09-27",
            "numChildren": 0
        },
        "data": {
            "key": "Z8XZW5EB",
            "version": 55,
            "itemType": "journalArticle",
            "title": "Threats to Cyber Security: The Dangers of Malicious Mobile Code, Users, and the iPhone",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Jason D.",
                    "lastName": "Thaanum"
                }
            ],
            "abstractNote": "The following article covers issues with the iPhone, along with the cyber threats associated with jailbreaking. The reader will be introduced to how technology has grown from its basic ideas and innovations to today's digital explosion of cyber technology and the associated colored hats that defend and shatter said technology. An overview of cyber security, malicious mobile code, jailbreaking, and personal interviews with hackers will also be presented.",
            "publicationTitle": "Journal of Applied Security Research",
            "publisher": "",
            "place": "",
            "date": "September 27, 2013",
            "volume": "8",
            "issue": "4",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "490-509",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "10.1080/19361610.2013.825755",
            "citationKey": "",
            "url": "http://dx.doi.org/10.1080/19361610.2013.825755",
            "accessDate": "2014-09-22T01:10:27Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1936-1610",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Threats to Cyber Security",
            "language": "",
            "libraryCatalog": "Taylor and Francis+NEJM",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T01:13:20Z",
            "dateModified": "2014-09-22T01:13:20Z"
        }
    },
    {
        "key": "BEVEMDI3",
        "version": 53,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/BEVEMDI3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/BEVEMDI3",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Riezenman",
            "parsedDate": "2000-06",
            "numChildren": 0
        },
        "data": {
            "key": "BEVEMDI3",
            "version": 53,
            "itemType": "journalArticle",
            "title": "Cellular security: better, but foes still lurk",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "M.J.",
                    "lastName": "Riezenman"
                }
            ],
            "abstractNote": "Service providers have largely solved the cellular phone cloning problem through application of technology, but it has been replaced by other problems: subscription fraud (the same problem that bedevils issuers of credit cards) and the misapplication of service provider subsidies on handsets. Subscription fraud has several forms: pretending to be another, real person; pretending to be a nonexistent person; and even just being yourself and pretending you intend to pay your bill. Subsidy fraud involves taking a phone whose cost has been heavily subsidized by a cellular carrier and activating it on a different carrier's network. Solutions to these problems exist. As the practice of conducting serious business over the Internet continues to grow, other security issues will arise. In particular someone conducting business on a cell phone needs to be confident of the identity of the other instrument's user. The technical solutions discussed, like RF fingerprinting and authentication, do a good job of guaranteeing that the handset is what it claims to be, but they guarantee nothing about the person using it. Several approaches are being pursued to user identification",
            "publicationTitle": "IEEE Spectrum",
            "publisher": "",
            "place": "",
            "date": "June 2000",
            "volume": "37",
            "issue": "6",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "39-42",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "10.1109/6.846096",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0018-9235",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Cellular security",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Cellular networks"
                },
                {
                    "tag": "Cellular phones"
                },
                {
                    "tag": "RF fingerprinting"
                },
                {
                    "tag": "authentication"
                },
                {
                    "tag": "cellular security"
                },
                {
                    "tag": "electronic commerce"
                },
                {
                    "tag": "service provider subsidies misapplication"
                }
            ],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T01:09:41Z",
            "dateModified": "2014-09-22T01:09:41Z"
        }
    },
    {
        "key": "BFQPW9A4",
        "version": 51,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/BFQPW9A4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/BFQPW9A4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Ravi et al.",
            "parsedDate": "2004-08",
            "numChildren": 0
        },
        "data": {
            "key": "BFQPW9A4",
            "version": 51,
            "itemType": "journalArticle",
            "title": "Security in Embedded Systems: Design Challenges",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Srivaths",
                    "lastName": "Ravi"
                },
                {
                    "creatorType": "author",
                    "firstName": "Anand",
                    "lastName": "Raghunathan"
                },
                {
                    "creatorType": "author",
                    "firstName": "Paul",
                    "lastName": "Kocher"
                },
                {
                    "creatorType": "author",
                    "firstName": "Sunil",
                    "lastName": "Hattangady"
                }
            ],
            "abstractNote": "Many modern electronic systems---including personal computers, PDAs, cell phones, network routers, smart cards, and networked sensors to name a few---need to access, store, manipulate, or communicate sensitive information, making security a serious concern in their design. Embedded systems, which account for a wide range of products from the electronics, semiconductor, telecommunications, and networking industries, face some of the most demanding security concerns---on the one hand, they are often highly resource constrained, while on the other hand, they frequently need to operate in physically insecure environments.Security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misconstrued by embedded system designers as the addition of features, such as specific cryptographic algorithms and security protocols, to the system. In reality, it is a new dimension that designers should consider throughout the design process, along with other metrics such as cost, performance, and power.The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low- and high-end embedded systems. This challenge, which we refer to as the \"security processing gap,\" is compounded by increases in the amounts of data manipulated and the data rates that need to be achieved. Equally daunting is the \"battery gap\" in battery-powered embedded systems, which is caused by the disparity between rapidly increasing energy requirements for secure operation and slow improvements in battery technology. The final challenge is the \"assurance gap,\" which relates to the gap between functional security measures (e.g., security services, protocols, and their constituent cryptographic algorithms) and actual secure implementations. This paper provides an introduction to the challenges involved in secure embedded system design, discusses recent advances in addressing them, and identifies opportunities for future research.",
            "publicationTitle": "ACM Trans. Embed. Comput. Syst.",
            "publisher": "",
            "place": "",
            "date": "August 2004",
            "volume": "3",
            "issue": "3",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "461–491",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "10.1145/1015047.1015049",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/1015047.1015049",
            "accessDate": "2014-09-22T01:00:13Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1539-9087",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Security in Embedded Systems",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Embedded systems"
                },
                {
                    "tag": "architecture"
                },
                {
                    "tag": "authentication"
                },
                {
                    "tag": "battery life"
                },
                {
                    "tag": "cryptographic algorithms"
                },
                {
                    "tag": "decryption"
                },
                {
                    "tag": "encryption"
                },
                {
                    "tag": "hardware design"
                },
                {
                    "tag": "processing requirements"
                },
                {
                    "tag": "security"
                },
                {
                    "tag": "security attacks"
                },
                {
                    "tag": "security protocols"
                },
                {
                    "tag": "tamper resistance"
                }
            ],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T01:05:52Z",
            "dateModified": "2014-09-22T01:05:52Z"
        }
    },
    {
        "key": "FVW2BFUH",
        "version": 48,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/FVW2BFUH",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/FVW2BFUH",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/MCXVZMGD",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "FVW2BFUH",
            "version": 48,
            "parentItem": "MCXVZMGD",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "NIST-Guidelines-on-Cell-Phone-and-PDA-Security.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "NIST-Guidelines-on-Cell-Phone-and-PDA-Security.pdf",
            "md5": "9fff7d7989a9bb2ff565f1ee82e5a7ef",
            "mtime": 1411347535287,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-22T00:58:52Z",
            "dateModified": "2014-09-22T00:58:52Z"
        }
    },
    {
        "key": "MCXVZMGD",
        "version": 44,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/MCXVZMGD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/MCXVZMGD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Jansen and Scarfone",
            "parsedDate": "2008-10",
            "numChildren": 2
        },
        "data": {
            "key": "MCXVZMGD",
            "version": 44,
            "itemType": "journalArticle",
            "title": "Guidelines on cell phone and PDA security",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Wayne",
                    "lastName": "Jansen"
                },
                {
                    "creatorType": "author",
                    "firstName": "Karen",
                    "lastName": "Scarfone"
                }
            ],
            "abstractNote": "Cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly \nmobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations, and remotely accessing data. While these devices provide productivity benefits, they also pose new risks to \norganizations. This document provides an overview of cell phone and PDA devices in use today and offers insights into making informed information technology security decisions on their treatment. The document gives details about the threats and technology risks associated with the use of these devices and the available safeguards to mitigate them. Organizations can use this information to enhance security and reduce incidents involving cell phone and PDA devices.",
            "publicationTitle": "NIST Special Publication",
            "publisher": "",
            "place": "",
            "date": "October 2008",
            "volume": "800",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "124",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T00:57:55Z",
            "dateModified": "2014-09-22T00:57:55Z"
        }
    },
    {
        "key": "PH7ZHS9W",
        "version": 42,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/PH7ZHS9W",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/PH7ZHS9W",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/VR2WHRI2",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "PH7ZHS9W",
            "version": 42,
            "parentItem": "VR2WHRI2",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "isbn9512252392.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "isbn9512252392.pdf",
            "md5": "018d5e5c5c322e6c68ae2966b5b1657e",
            "mtime": 1411347149908,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-22T00:52:27Z",
            "dateModified": "2014-09-22T00:52:27Z"
        }
    },
    {
        "key": "VR2WHRI2",
        "version": 40,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/VR2WHRI2",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/VR2WHRI2",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Hollmén",
            "parsedDate": "2000-12-19",
            "numChildren": 1
        },
        "data": {
            "key": "VR2WHRI2",
            "version": 40,
            "itemType": "book",
            "title": "User profiling and classification for fraud detection in mobile communications networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Jaakko",
                    "lastName": "Hollmén"
                }
            ],
            "abstractNote": "The topic of this thesis is fraud detection in mobile communications networks by means of user profiling and classification techniques. The goal is to first identify relevant user groups based on call data and then to assign a user to a relevant group. Fraud may be defined as a dishonest or illegal use of services, with the intention to avoid service charges. Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. Whereas the intentions of the mobile phone users cannot be observed, it is assumed that the intentions are reflected in the call data. The call data is subsequently used in describing behavioral patterns of users. Neural networks and probabilistic models are employed in learning these usage patterns from call data. These models are used either to detect abrupt changes in established usage patterns or to recognize typical usage patterns of fraud. The methods are shown to be effective in detecting fraudulent behavior by empirically testing the methods with data from real mobile communications networks.",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2000-12-19",
            "publisher": "Helsinki University of Technology",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "951-22-5239-2",
            "DOI": "",
            "citationKey": "",
            "url": "https://aaltodoc.aalto.fi:443/handle/123456789/2311",
            "accessDate": "2014-09-22T00:44:52Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "aaltodoc.aalto.fi",
            "callNumber": "",
            "rights": "",
            "extra": "reviewed",
            "tags": [
                {
                    "tag": " data analysis "
                },
                {
                    "tag": "Computer science "
                },
                {
                    "tag": "Electrical engineering"
                },
                {
                    "tag": "data mining "
                },
                {
                    "tag": "fraud detection"
                },
                {
                    "tag": "neural networks "
                },
                {
                    "tag": "probabilistic models "
                },
                {
                    "tag": "telecommunication"
                }
            ],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T00:51:14Z",
            "dateModified": "2014-09-22T00:51:14Z"
        }
    },
    {
        "key": "2M24PWAT",
        "version": 38,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/2M24PWAT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/2M24PWAT",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/VFC7IHPP",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "2M24PWAT",
            "version": 38,
            "parentItem": "VFC7IHPP",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "WirelessSecSurv4.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "WirelessSecSurv4.pdf",
            "md5": "fb90139c02fd44d6146623b3bbc3358a",
            "mtime": 1411339561023,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-22T00:34:52Z",
            "dateModified": "2014-09-22T00:34:52Z"
        }
    },
    {
        "key": "VFC7IHPP",
        "version": 36,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/VFC7IHPP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/VFC7IHPP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Grosser et al.",
            "parsedDate": "2005-01-01",
            "numChildren": 1
        },
        "data": {
            "key": "VFC7IHPP",
            "version": 36,
            "itemType": "bookSection",
            "title": "Detecting Fraud in Mobile Telephony Using Neural Networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "H.",
                    "lastName": "Grosser"
                },
                {
                    "creatorType": "author",
                    "firstName": "P.",
                    "lastName": "Britos"
                },
                {
                    "creatorType": "author",
                    "firstName": "R.",
                    "lastName": "García-Martínez"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Moonis",
                    "lastName": "Ali"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Floriana",
                    "lastName": "Esposito"
                }
            ],
            "abstractNote": "Our work focuses on: the problem of detecting unusual changes of consumption in mobile phone users, the corresponding building of data structures which represent the recent and historic users’ behaviour bearing in mind the information included in a call, and the complexity of the construction of a function with so many variables where the parameterization is not always known.",
            "bookTitle": "Innovations in Applied Artificial Intelligence",
            "series": "Lecture Notes in Computer Science",
            "seriesNumber": "3533",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2005/01/01",
            "publisher": "Springer Berlin Heidelberg",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "613-615",
            "ISBN": "978-3-540-26551-1, 978-3-540-31893-4",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/11504894_85",
            "accessDate": "2014-09-22T00:29:36Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©2005 Springer-Verlag Berlin Heidelberg",
            "extra": "",
            "tags": [
                {
                    "tag": "Artificial Intelligence (incl. Robotics) "
                },
                {
                    "tag": "Computation by Abstract Devices"
                },
                {
                    "tag": "Information Systems Applications (incl.Internet)"
                },
                {
                    "tag": "Pattern Recognition "
                },
                {
                    "tag": "Software Engineering "
                },
                {
                    "tag": "User Interfaces and Human Computer Interaction"
                }
            ],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T00:34:29Z",
            "dateModified": "2014-09-22T00:34:29Z"
        }
    },
    {
        "key": "R2TWUKW7",
        "version": 34,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/R2TWUKW7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/R2TWUKW7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Gold",
            "parsedDate": "2012-04",
            "numChildren": 0
        },
        "data": {
            "key": "R2TWUKW7",
            "version": 34,
            "itemType": "journalArticle",
            "title": "Hacking on the hoof",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "S.",
                    "lastName": "Gold"
                }
            ],
            "abstractNote": "'Grey hat' apps are a new phenomenon in software that enable street hackers to delve into our smartphone and access our data, and more besides. Wireless analysis applications are plentiful across Windows, Mac and Linux operating systems. Netstumbler, PRTG Network Monitor, and Wireshark all do the same sort of job. However, lugging around a laptop is not as easy as toting a slimline smartphone. Now the open nature of Google's Android, coupled with the immense portability of smartphones, has created a new genre of wireless apps that do everything the laptop applications do, but on a wider scale. Since the end of 2011, after the release of version 4.x and 5.x of the feature-rich Apple portable operating system known as iOS, a number of wireless analysis apps have started appearing on the iPhone and iPad platforms. Conspiracy theorists have attributed the arrival of interrogative Wi-Fi network apps for the Apple portable operating system platform to the passing of former CEO Steve Jobs; but it seems that the powerful upgrade of iOS 5.x in October 2011 has given programmers the ability to dive deep into the iPhone and iPad's innermost workings to launch a species of so-called Prosumer Interrogative Network (PIN) apps. Three of these new apps SharkforRoot (Android), SubNetlnsight (iOS) and Fing (Android and iOS) also differ from their desktop peers in covering several network analysis bases on an all-in-one basis. To use a Western movie analogy, these apps can be used for 'white hat' hacking and network analysis, as well as 'black hat' hacking and cyber criminality a development that marks a new cause for concern among the mobile security sector.",
            "publicationTitle": "Engineering & Technology",
            "publisher": "",
            "place": "",
            "date": "April 2012",
            "volume": "7",
            "issue": "3",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "80-83",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Engineering & Technology",
            "DOI": "10.1049/et.2012.0313",
            "citationKey": "",
            "url": "http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=76246391&site=ehost-live",
            "accessDate": "2014-09-22T00:23:46Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "17509637",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "EBSCOhost",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "ANDROID (Operating system) "
                },
                {
                    "tag": "CELL phones -- Security measures"
                },
                {
                    "tag": "HACKING (Computer security) "
                },
                {
                    "tag": "IPAD (Computer) "
                },
                {
                    "tag": "OPERATING systems (Computers) "
                },
                {
                    "tag": "SMARTPHONES"
                }
            ],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-22T00:27:55Z",
            "dateModified": "2014-09-22T00:27:55Z"
        }
    },
    {
        "key": "H3FIHNI7",
        "version": 32,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/H3FIHNI7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/H3FIHNI7",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/B8GVMXTI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "H3FIHNI7",
            "version": 32,
            "parentItem": "B8GVMXTI",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "WirelessSecSurv4.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "WirelessSecSurv4.pdf",
            "md5": "fb90139c02fd44d6146623b3bbc3358a",
            "mtime": 1411339561023,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-21T22:45:58Z",
            "dateModified": "2014-09-21T22:45:58Z"
        }
    },
    {
        "key": "B8GVMXTI",
        "version": 30,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/B8GVMXTI",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/B8GVMXTI",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Fernandez et al.",
            "parsedDate": "2004-11-19",
            "numChildren": 1
        },
        "data": {
            "key": "B8GVMXTI",
            "version": 30,
            "itemType": "journalArticle",
            "title": "An overview of the security of wireless networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "E.B.",
                    "lastName": "Fernandez"
                },
                {
                    "creatorType": "author",
                    "firstName": "I.",
                    "lastName": "Jawhar"
                },
                {
                    "creatorType": "author",
                    "firstName": "M.M.",
                    "lastName": "Larrondo-Petrie"
                },
                {
                    "creatorType": "author",
                    "firstName": "M.",
                    "lastName": "Van Hilst"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Handbook of Wireless LANs, CRC Press, Boca Raton",
            "publisher": "",
            "place": "",
            "date": "November 19, 2004",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://faculty.uaeu.ac.ae/ijawhar/publications/WirelessSecSurv4.pdf",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-21T22:45:37Z",
            "dateModified": "2014-09-21T22:45:37Z"
        }
    },
    {
        "key": "HS9QZKN4",
        "version": 28,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/HS9QZKN4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/HS9QZKN4",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/96RQJG5S",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "HS9QZKN4",
            "version": 28,
            "parentItem": "96RQJG5S",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "ContentServer.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "ContentServer.pdf",
            "md5": "2646953740293127ad7860887bf0839f",
            "mtime": 1411339274532,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-21T22:41:12Z",
            "dateModified": "2014-09-21T22:41:12Z"
        }
    },
    {
        "key": "96RQJG5S",
        "version": 26,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/96RQJG5S",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/96RQJG5S",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Courtney",
            "parsedDate": "2014-05-01",
            "numChildren": 1
        },
        "data": {
            "key": "96RQJG5S",
            "version": 26,
            "itemType": "journalArticle",
            "title": "Protecting the mobile enterprise",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "M.",
                    "lastName": "Courtney"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Engineering & Technology",
            "publisher": "",
            "place": "",
            "date": "2014-05-01",
            "volume": "9",
            "issue": "4",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "72-6",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "10.1049/et.2014.0409",
            "citationKey": "",
            "url": "http://digital-library.theiet.org/content/journals/10.1049/et.2014.0409",
            "accessDate": "2014-09-21T22:38:07Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1750-9637, 1750-9645",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "CrossRef",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-21T22:41:03Z",
            "dateModified": "2014-09-21T22:41:03Z"
        }
    },
    {
        "key": "8ZC3B5ZE",
        "version": 24,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/8ZC3B5ZE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/8ZC3B5ZE",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/E94RV2EV",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "8ZC3B5ZE",
            "version": 24,
            "parentItem": "E94RV2EV",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "Burge and Shawe-Taylor - 2001 - An Unsupervised Neural Network Approach to Profili.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Burge and Shawe-Taylor - 2001 - An Unsupervised Neural Network Approach to Profili.pdf",
            "md5": "1a4d88e46affecd6e0aba98a31a7de9a",
            "mtime": 1411338950694,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-21T22:35:49Z",
            "dateModified": "2014-09-21T22:35:49Z"
        }
    },
    {
        "key": "E94RV2EV",
        "version": 22,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/E94RV2EV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/E94RV2EV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Burge and Shawe-Taylor",
            "parsedDate": "2001-07",
            "numChildren": 1
        },
        "data": {
            "key": "E94RV2EV",
            "version": 22,
            "itemType": "journalArticle",
            "title": "An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in Fraud Detection",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Peter",
                    "lastName": "Burge"
                },
                {
                    "creatorType": "author",
                    "firstName": "John",
                    "lastName": "Shawe-Taylor"
                }
            ],
            "abstractNote": "This paper discusses the current status of research on fraud detection undertaken as part of the European Commission-funded ACTS ASPeCT (Advanced Security for Personal Communications Technologies) project, by Royal Holloway University of London. Using a recurrent neural network technique, we uniformly distribute prototypes over toll tickets, sampled from the U.K. network operator, Vodafone. The prototypes, which continue to adapt to cater for seasonal or long term trends, are used to classify incoming toll tickets to form statistical behavior profiles covering both the short- and the long-term past. We introduce a new decaying technique, which maintains these profiles such that short-term information is updated on a per toll ticket basis whilst the update of the long-term behavior can be delayed and controlled by the user. The new technique ensures that the short-term history updates the long-term history applying an even weighting to each toll ticket. The behavior profiles, maintained as probability distributions, form the input to a differential analysis utilizing a measure known as the Hellinger distance between them as an alarm criterion. Fine tuning the system to minimize the number of false alarms poses a significant task due to the low fraudulent/nonfraudulent activity ratio. We benefit from using unsupervised learning in that no fraudulent examples are required for training. This is very relevant considering the currently secure nature of GSM where fraud scenarios, other than subscription fraud, have yet to manifest themselves. It is the aim of ASPeCT to be prepared for the would-be fraudster for both GSM and UMTS.",
            "publicationTitle": "Journal of Parallel and Distributed Computing",
            "publisher": "",
            "place": "",
            "date": "July 2001",
            "volume": "61",
            "issue": "7",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "915-925",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Journal of Parallel and Distributed Computing",
            "DOI": "10.1006/jpdc.2000.1720",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S0743731500917209",
            "accessDate": "2014-09-21T22:32:17Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0743-7315",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ScienceDirect",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-21T22:35:38Z",
            "dateModified": "2014-09-21T22:35:38Z"
        }
    },
    {
        "key": "PD53HXGT",
        "version": 20,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/PD53HXGT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/PD53HXGT",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/EQM3K97H",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "PD53HXGT",
            "version": 20,
            "parentItem": "EQM3K97H",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "Boukerche and Annoni Notare - 2002 - Behavior-Based Intrusion Detection in Mobile Phone.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Boukerche and Annoni Notare - 2002 - Behavior-Based Intrusion Detection in Mobile Phone.pdf",
            "md5": "374d439698077cee0c60734fb3c62b3a",
            "mtime": 1411338349289,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-21T22:31:20Z",
            "dateModified": "2014-09-21T22:31:20Z"
        }
    },
    {
        "key": "EQM3K97H",
        "version": 18,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/EQM3K97H",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/EQM3K97H",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Bruce et al.",
            "parsedDate": "2013-04-28",
            "numChildren": 1
        },
        "data": {
            "key": "EQM3K97H",
            "version": 18,
            "itemType": "journalArticle",
            "title": "Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Ndibanje",
                    "lastName": "Bruce"
                },
                {
                    "creatorType": "author",
                    "firstName": "Tae-Yong",
                    "lastName": "Kim"
                },
                {
                    "creatorType": "author",
                    "firstName": "Hoon Jae",
                    "lastName": "Lee"
                }
            ],
            "abstractNote": "The communication between cell phones and sensor networks involves strong user authentication protocols to ensure the data and network security. Generally, in order to obtain the relevant information, cell phones interact with sensor networks via gateways. In 2009, according to Arjan Durresi and Vamsi Paruchuri scheme, this unique ability is used to provide better authentication and security protocols that can be used to establish secure communications among cell phones and sensor networks. In this paper, we show that their scheme is vulnerable to known attacks such as man-in-the-middle attack and reply attack, and it does not provide mutual authentication between gateway node and cell phone. In addition, it does not establish session key after the authentication phase. To fill this security gap, we proposed security patches and improvements, which overcome the weak features in the scheme of Arjan Durresi and Vamsi Paruchuri. Finally, we came out with results which show that our improved security patch establishes trust between the cell phone and gateway in the form of mutual authentication and provides the session key establishment after the authentication phase.",
            "publicationTitle": "International Journal of Distributed Sensor Networks",
            "publisher": "",
            "place": "",
            "date": "2013/04/28",
            "volume": "2013",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "e348783",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "10.1155/2013/348783",
            "citationKey": "",
            "url": "http://www.hindawi.com/journals/ijdsn/2013/348783/abs/",
            "accessDate": "2014-09-21T22:26:36Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1550-1329",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "www.hindawi.com",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-21T22:31:10Z",
            "dateModified": "2014-09-21T22:31:10Z"
        }
    },
    {
        "key": "GBV9QEW5",
        "version": 16,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/GBV9QEW5",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/GBV9QEW5",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/6MI3Q5J4",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "GBV9QEW5",
            "version": 16,
            "parentItem": "6MI3Q5J4",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "Boukerche and Annoni Notare - 2002 - Behavior-Based Intrusion Detection in Mobile Phone.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Boukerche and Annoni Notare - 2002 - Behavior-Based Intrusion Detection in Mobile Phone.pdf",
            "md5": "374d439698077cee0c60734fb3c62b3a",
            "mtime": 1411338349289,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-21T22:25:47Z",
            "dateModified": "2014-09-21T22:25:47Z"
        }
    },
    {
        "key": "6MI3Q5J4",
        "version": 14,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/6MI3Q5J4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/6MI3Q5J4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Boukerche and Annoni Notare",
            "parsedDate": "2002-09",
            "numChildren": 1
        },
        "data": {
            "key": "6MI3Q5J4",
            "version": 14,
            "itemType": "journalArticle",
            "title": "Behavior-Based Intrusion Detection in Mobile Phone Systems",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Azzedine",
                    "lastName": "Boukerche"
                },
                {
                    "creatorType": "author",
                    "firstName": "Mirela Sechi M.",
                    "lastName": "Annoni Notare"
                }
            ],
            "abstractNote": "The field of mobile and wireless networking is reemerging amid unprecedented growth in the scale and diversity of computer networking. However, further increases in network security are necessary before the promise of mobile communication can be fulfilled. In this paper, we describe how neural networks and tools can be applied against frauds in analog mobile telecommunication networks. To the best of our knowledge there has been a lot of work done to secure the usage of mobile phones at the hardware level, but very little at the software level. In this paper, we present an on-line security system for fraud detection of impostors and improper use of mobile phone operations based on a neural network (NN) classifier. It acts solely on the recent information and past history of the mobile phone owner activities, and classifies the telephone users into classes according to their usage logs. Such logs contain the relevant characteristics for every call made by the user. As soon as the system identifies a fraud, it notifies both the carrier telecom and the victim about it immediately and not at the end of the monthly bill cycle. In our implementation, we make use of the radial basis function (RBF) model because of its simplicity and its flexibility to adapt to pattern changes, i.e., it encompasses the important characteristic of learning. By learning, a RBF NN can discover some regular patterns and the relation across them, and organize itself for making these associations. As a consequence it is widely used for solving classification and pattern recognition problems. Our results indicate that our system reduces significantly the telecom carriers's profit losses as well as the damage that might be passed to the clients. This might help the carriers to reduce the cost of phone calls and will, in turn, benefit the users.",
            "publicationTitle": "Journal of Parallel and Distributed Computing",
            "publisher": "",
            "place": "",
            "date": "September 2002",
            "volume": "62",
            "issue": "9",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "1476-1490",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Journal of Parallel and Distributed Computing",
            "DOI": "10.1006/jpdc.2002.1857",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S0743731502918575",
            "accessDate": "2014-09-21T22:17:58Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0743-7315",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ScienceDirect",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-21T22:25:33Z",
            "dateModified": "2014-09-21T22:25:33Z"
        }
    },
    {
        "key": "H44M53HM",
        "version": 12,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/H44M53HM",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/H44M53HM",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/BU5FUIC9",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "H44M53HM",
            "version": 12,
            "parentItem": "BU5FUIC9",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "basron-nnworld96.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "basron-nnworld96.pdf",
            "md5": "4972628ecef145bdb9b9cb31786958fe",
            "mtime": 1411337273679,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-21T22:20:08Z",
            "dateModified": "2014-09-21T22:20:08Z"
        }
    },
    {
        "key": "3SVCIJBX",
        "version": 10,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/3SVCIJBX",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/3SVCIJBX",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/290040/items/BU5FUIC9",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "3SVCIJBX",
            "version": 10,
            "parentItem": "BU5FUIC9",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "basron-nnworld96.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "basron-nnworld96.pdf",
            "md5": "4972628ecef145bdb9b9cb31786958fe",
            "mtime": 1411337273679,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-09-21T22:19:58Z",
            "dateModified": "2014-09-21T22:19:58Z"
        }
    },
    {
        "key": "BU5FUIC9",
        "version": 8,
        "library": {
            "type": "group",
            "id": 290040,
            "name": "Datta CS 110",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/datta_cs_110",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/290040/items/BU5FUIC9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/datta_cs_110/items/BU5FUIC9",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2055166,
                "username": "pdatta15",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/pdatta15",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Barbeau et al.",
            "parsedDate": "2006-01-01",
            "numChildren": 2
        },
        "data": {
            "key": "BU5FUIC9",
            "version": 8,
            "itemType": "bookSection",
            "title": "Detecting Impersonation Attacks in Future Wireless and Mobile Networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Michel",
                    "lastName": "Barbeau"
                },
                {
                    "creatorType": "author",
                    "firstName": "Jyanthi",
                    "lastName": "Hall"
                },
                {
                    "creatorType": "author",
                    "firstName": "Evangelos",
                    "lastName": "Kranakis"
                },
                {
                    "creatorType": "author",
                    "firstName": "Mike",
                    "lastName": "Burmester"
                },
                {
                    "creatorType": "author",
                    "firstName": "Alec",
                    "lastName": "Yasinsac"
                }
            ],
            "abstractNote": "Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio Frequency Fingerprinting and User Mobility Profiles and discuss details of our methodologies for building enhanced intrusion detection systems for future wireless and mobile networks.",
            "bookTitle": "Secure Mobile Ad-hoc Networks and Sensors",
            "series": "Lecture Notes in Computer Science",
            "seriesNumber": "4074",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2006/01/01",
            "publisher": "Springer Berlin Heidelberg",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "80-95",
            "ISBN": "978-3-540-36646-1, 978-3-540-37863-1",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/11801412_8",
            "accessDate": "2014-09-21T21:55:42Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©2006 Springer-Verlag Berlin Heidelberg",
            "extra": "",
            "tags": [
                {
                    "tag": "Algorithm Analysis and Problem Complexity"
                },
                {
                    "tag": "Communications Engineering, Networks"
                },
                {
                    "tag": "Computer Communication Networks"
                },
                {
                    "tag": "Data Encryption"
                },
                {
                    "tag": "Information Systems Applications (incl.Internet)"
                },
                {
                    "tag": "Management of Computing and Information Systems"
                }
            ],
            "collections": [
                "N4C5ERWK"
            ],
            "relations": {},
            "dateAdded": "2014-09-21T22:13:39Z",
            "dateModified": "2014-09-21T22:13:39Z"
        }
    }
]