A behavior observation tool (BOT) for mobile device network connection logs
Abstract
References
Index Terms
- A behavior observation tool (BOT) for mobile device network connection logs
Recommendations
Mobile device security
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentBecause of their small size, memory capability, and the case with which information can be downloaded and removed from a facility, mobile devices pose a risk to organizations when used and transported outside physical boundaries. Mobile devices, ...
External device session initiation framework using mobile phone connection information
AINTEC '12: Proceedings of the 8th Asian Internet Engineering ConferenceRecent advancement of communications systems enables that any person can easily connect to others using network devices. However, it is still bothering to setup an external device to communicate with other devices. This paper proposes a framework for ...
Evaluating the regularity of human behavior from mobile phone usage logs
PAKDD'11: Proceedings of the 15th international conference on New Frontiers in Applied Data MiningThis paper investigated the relationship between incrementally logged phone logs and self-reported survey data to derive regularity and predictability from mobile phone usage logs. First, we extracted information not from a single value such as location ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Chin-Wan Chung,
- Program Chairs:
- Andrei Broder,
- Kyuseok Shim,
- Torsten Suel
Sponsors
- IW3C2: International World Wide Web Conference Committee
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- IW3C2
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 79Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in