T. Pointsec-mobile, IT Professionals Turn Blind Eye to Mobile Security as Survey Reveals Sloppy Handheld Habits " . Pointsec news releases, Available from http, 2005.

O. Mazhelis and S. Puuronen, Characteristics and Measures for Mobile-Masquerader Detection
DOI : 10.1007/0-387-31167-X_20

T. Lane, Machine Learning Techniques for the Computer Security Domain of Anomaly Detection, 2000.

C. M. Bishop, Neural Networks for Pattern Recognition, 1995.

R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, 2000.

C. M. Bishop, Novelty detection and neural network validation, IEE Proceedings ? Vision, Image and Signal processing, pp.217-222, 1994.

D. Tax, One-class classification, 2001.

D. M. Tax and R. P. Duin, Support Vector Data Description, Machine Learning, pp.45-66, 2004.
DOI : 10.1023/B:MACH.0000008084.60811.49

A. Dempster, N. Laird, and D. Rubin, Maximum likelihood from incomplete data via the EM algorithm, Journal of the Royal Statistical Society, vol.39, issue.1, pp.1-38, 1977.

W. Fan, M. Miller, S. J. Stolfo, W. Lee, and P. K. Chan, Using artificial anomalies to detect unknown and known network intrusions, Proceedings of the First IEEE International Conference on Data Mining, 2001.
DOI : 10.1007/s10115-003-0132-7

G. L. Peterson, R. F. Mills, B. T. Mcbride, and W. C. Allred, A Comparison of Generalizability for Anomaly Detection, International Workshop on Data Mining Methods for Anomaly Detectio, 2005.

E. Keogh, S. Lonardi, and C. A. Ratanamahatana, Towards parameter-free data mining, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.206-215, 2004.
DOI : 10.1145/1014052.1014077

M. Hilario and A. Kalousis, Characterizing Learning Models and Algorithms for Classification, Deliverables 2.1a, 2.2a, 1999.

M. Markou, S. Singh, M. Markou, and S. Singh, Novelty detection: a review???part 2:, Signal Processing, pp.2499-2521, 2003.
DOI : 10.1016/j.sigpro.2003.07.019

L. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition, Proceedings of the IEEE, pp.257-286, 1989.

S. Kumar, Classification and Detection of Computer Intrusions, 1995.

J. Hollmen, User Profiling and Classification for Fraud Detection in Mobile Communications Networks, 2000.

V. Poosala, P. J. Haas, Y. E. Ioannidis, and E. J. Shekita, Improved histograms for selectivity estimation of range predicates, Proceedings of the 1996 ACM SIGMOD international conference on Management of data, pp.294-305, 1996.

A. Aboulnaga and S. Chaudhuri, Self-tuning histograms: building histograms without looking at data, Proceedings of the 1999 ACM SIG- MOD international conference on Management of data, pp.181-192, 1999.

H. Javits and A. Valdes, The SRI IDES statistical anomaly detector, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991.
DOI : 10.1109/RISP.1991.130799

T. F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalali et al., A prototype real-time intrusion-detection expert system, Proceedings. 1988 IEEE Symposium on Security and Privacy, 1992.
DOI : 10.1109/SECPRI.1988.8098

T. Lunt, Detecting Intruders in Computer Systems, Conference on Auditing and Computer Technology, 1993.

H. S. Javits and A. Valdes, The NIDES Statistical Component: Description and Justification, 1993.

D. Anderson, T. Frivold, and A. Valdes, Nextgeneration Intrusion Detection Expert System (NIDES): A Summary, 1995.

K. Yamanishi, J. Ichi-takeuchi, G. Williams, and P. Milne, On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms, Data Mining and Knowledge Discovery, vol.8, issue.3, pp.275-300, 2004.
DOI : 10.1023/B:DAMI.0000023676.72185.7c

D. L. Isaacson and R. W. Madsen, Markov chains: theory and applications, 1976.

J. Campbell and J. P. , Speaker recognition: a tutorial, Proceedings of the IEEE, pp.1437-1462, 1997.
DOI : 10.1109/5.628714

C. Warrender, S. Forrest, and B. Pearlmutter, Detecting intrusions using system calls: alternative data models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.133-145, 1999.
DOI : 10.1109/SECPRI.1999.766910

D. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, vol.36, issue.1, pp.229-243, 2003.
DOI : 10.1016/S0031-3203(02)00026-2

N. Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection, Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, pp.171-174, 2000.

S. Cho and H. Park, Efficient anomaly detection by modeling privilege flows using hidden Markov model, Computers & Security, vol.22, issue.1, pp.45-55, 2003.
DOI : 10.1016/S0167-4048(03)00112-3

T. Lane and C. E. Brodley, An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection, Machine Learning, pp.73-107, 2003.

M. Lauer, A Mixture Approach to Novelty Detection Using Training Data with Outliers, Proceedings of the 12th European Conference on Machine Learning, pp.300-311
DOI : 10.1007/3-540-44795-4_26

R. M. Neal and G. E. Hinton, Learning in graphical models, chap. A view of the EM algorithm that justifies incremental, sparse, and other variants, pp.355-368, 1999.

N. Ye and Q. Chen, An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems, Quality and Reliability Engineering International, vol.34, issue.2, pp.105-112, 2001.
DOI : 10.1002/qre.392

R. Puttini, Z. Marrakchi, and L. Me, A Bayesian Classification Model for Real-Time Intrusion Detection, AIP Conference Proceedings, pp.150-162, 2003.
DOI : 10.1063/1.1570541

D. Yeung and C. Chow, Parzen-window network intrusion detectors, Proceedings of the Sixteenth International Conference on Pattern Recognition (ICPR), pp.385-388, 2002.

T. Hastie, R. Tibshirani, and J. H. Friedman, The Elements of Statistical Learning, 2001.

T. Kohonen, The self-organizing map, Proc. of the IEEE, pp.1464-1480, 1990.

D. Marchette, A statistical method for profiling network traffic, Proceedings of the Workshop on Intrusion Detection and Network Monitoring USENIX Association, pp.119-128, 1999.

S. Zanero and S. M. Savaresi, Unsupervised learning techniques for an intrusion detection system, Proceedings of the 2004 ACM symposium on Applied computing , SAC '04, pp.412-419, 2004.
DOI : 10.1145/967900.967988

J. Hollmen, V. Tresp, and O. Simula, A selforganizing map algorithm for clustering probabilistic models, Proceedings of the Ninth International Conference on Artificial Neural Networks (ICANN'99) of IEE Conference Proceedings The IEE, pp.946-951, 1999.

M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang, A Novel Anomaly Detection Scheme Based on Principal Component Classifier, Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM'03), pp.172-179, 2003.

D. De-ridder, E. Pekalska, and R. Duin, The economics of classification: error vs. complexity, Object recognition supported by user interaction for service robots, pp.244-247, 2002.
DOI : 10.1109/ICPR.2002.1048284

N. Japkowicz, Concept-Learning in the Absence of Counter-Examples: An Autoassociation-Based Approach to Classification, 1999.

G. E. Hinton and B. Ling-zhang, Connectionist learning procedures, MMU International Symposium on Information and Communications Technologies 2005. 2005. URL http, pp.185-234, 1989.
DOI : 10.1016/0004-3702(89)90049-0

R. Agrawal, T. Imielinski, and A. N. Swami, Mining Association Rules between Sets of Items in Large Databases, Proceedings of the 1993 ACM SIG- MOD International Conference on Management of Data, pp.207-216, 1993.

R. Agrawal and R. Srikant, Fast Algorithms for Mining Association Rules, Proc. 20th Int. Conf. Very Large Data Bases, VLDB, pp.487-499, 1994.

M. Klemettinen, H. Mannila, P. Ronkainen, H. Toivonen, and A. I. Verkamo, Finding interesting rules from large sets of discovered association rules, Proceedings of the third international conference on Information and knowledge management , CIKM '94, pp.401-407, 1994.
DOI : 10.1145/191246.191314

R. , B. Jr, and R. Agrawal, Mining the most interesting rules, Proceedings of

P. Tan, V. Kumar, and J. Srivastava, Selecting the right interestingness measure for association patterns, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, pp.32-41, 2002.
DOI : 10.1145/775047.775053

F. Angiulli, G. Ianni, and L. Palopoli, On the complexity of mining association rules, Ninth National Symposium on Advanced Database Systems, 2001.

D. Barbara, J. Couto, S. Jajodia, and N. Wu, ADAM, ACM SIGMOD Record, vol.30, issue.4, pp.15-24, 2001.
DOI : 10.1145/604264.604268

W. Lee and S. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, issue.4, pp.227-261, 2000.
DOI : 10.1145/382912.382914

S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz, A data mining analysis of RTID alarms, Computer Networks, vol.34, issue.4, pp.571-577, 2000.
DOI : 10.1016/S1389-1286(00)00138-9

X. Qin and W. Lee, Statistical Causality Analysis of INFOSEC Alert Data, Proceedings of The 6th International Symposium on Recent Advances in Intrusion Detection, pp.73-93, 2003.
DOI : 10.1007/978-3-540-45248-5_5

R. H. Shumway and D. S. Stoffer, Time series analysis and its applications. Springer texts in statistics, 2000.

N. Ye, C. Borror, and Y. Zhang, EWMA techniques for computer intrusion detection through anomalous changes in event intensity, Quality and Reliability Engineering International, vol.23, issue.6, pp.443-451, 2002.
DOI : 10.1002/qre.493

N. Ye and Q. Chen, Computer intrusion detection through EWMA for auto-correlated and uncorrelated data, IEEE Transactions on Reliability, vol.52, issue.1, pp.73-82, 2003.

A. Ypma and R. Duin, Support objects for domain approximation, Proceedings of Int. Conf. on Artificial Neural Networks ICANN'98, 1998.
DOI : 10.1007/978-1-4471-1599-1_110

T. Lane and C. E. Brodley, Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security, vol.2, issue.3, pp.295-331, 1999.
DOI : 10.1145/322510.322526

D. Tax and R. Duin, Data domain description using support vectors, Proc. of 7th European Symposium on Artificial Neural Networks (ESANN'1999), pp.251-256, 1999.

V. Vapnik, The nature of statistical learning theory, 1995.

B. Scholkopf, R. Williamson, A. Smola, J. Shawe-taylor, and J. Platt, Support vector method for novelty detection, Advances in Neural Information Processing Systems, 2000.

B. Scholkopf, J. C. Platt, J. Shawe-taylor, A. J. Smola, and R. C. Williamson, Estimating the Support of a High-Dimensional Distribution, Neural Computation, vol.6, issue.1, pp.1443-1471, 2001.
DOI : 10.1214/aos/1069362732

K. Wang and S. J. Stolfo, One Class Training for Masquerade Detection, ICDM Workshop on Data Mining for Computer Security (DMSEC)

K. A. Heller, K. M. Svore, A. D. Keromytis, and S. J. Stolfo, One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses, Proceedings of the ICDM Workshop on Data Mining for Computer Security, 2003.

B. V. Nguyen, An Application of Support Vector Machines to Anomaly Detection, 2002.

A. Lazarevic, L. Ertoz, A. Ozgur, J. Srivastava, and V. Kumar, A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection, Proceedings of Third SIAM Conference on Data Mining, 2003.
DOI : 10.1137/1.9781611972733.3

N. Tisby, On the application of mixture AR hidden Markov models to text independent speaker recognition, IEEE Transactions on Signal Processing, vol.39, issue.3, pp.563-570, 1991.
DOI : 10.1109/78.80876

A. Oulasvirta, M. Raento, and S. Tiitta, ContextContacts, Proceedings of the 7th international conference on Human computer interaction with mobile devices & services , MobileHCI '05, pp.167-174, 2005.
DOI : 10.1145/1085777.1085805

M. Raento, A. Oulasvirta, R. Petit, and H. Toivonen, ContextPhone, a prototyping platform for contextaware mobile applications, IEEE Pervasive Computing, vol.4, issue.2, pp.2005-1536

O. Mazhelis, S. Puuronen, and M. Raento, Evaluating Classifiers for Mobile-Masquerader Detection, Proceedings of Security and Privacy in Dynamic Environments (SEC2006), 21st IFIP TC-11 International Information Security Conference
DOI : 10.1007/0-387-33406-8_23

I. H. Witten and E. Frank, Data mining, ACM SIGMOD Record, vol.31, issue.1, 2000.
DOI : 10.1145/507338.507355

D. H. Wolpert, The Mathemtatics of Generalization, chap. The relationship between PAC, the statistical physics framework, the Bayesian framework, and the VC framework, 1994.